Application Security News and Articles


A Critical Guide to PCI Compliance

A Critical Guide to PCI Compliance madhav Thu, 12/12/2024 - 13:28 You are shopping online, adding items to your cart, and you're ready to pay with your credit card. You expect that when you hit "Checkout," your payment details will be safe. ...

The state of AppSec tooling: 4 ways to step up to modern software security

Traditional application security testing (AST) tools are out of step with modern development and AppSec practices. In the age of cloud-native architectures, continuous integration/continuous deployment (CI/CD) models, microservices, and ...

Charity Scams During the Holidays: How to Verify Legitimate Charities

The holiday season is a time of giving and generosity, but it’s also a prime time for scammers to take advantage of people’s goodwill. According to the FBI, charity scams increase significantly during the holidays as criminals look to exploit ...

Top 10 dmarcian Alternatives: Features, Pricing, Pros, and Cons

Searching for dmarcian alternatives? Explore the top DMARC management tools, compare features and pricing, and choose the best solution for your email security needs. The post Top 10 dmarcian Alternatives: Features, Pricing, Pros, and Cons ...

Krispy Kreme cybersecurity incident disrupts online ordering

Popular US doughnut chain Krispy Kreme has been having trouble with its online ordering system as well as digital payments at their brick-and-mortar shops since late November, and now we finally know why: an 8-K report filed with the US ...

Top 5 CMMC Services MSPs Should Offer

CMMC is a rigorous framework designed to enhance the security of the Department of Defense (DoD) supply chain. But while CMMC is essential, it can be challenging and resource-intensive.  This is especially true for SMBs. Small businesses are the ...

27 DDoS-for hire platforms seized by law enforcement

As part of an ongoing international crackdown known as Operation PowerOFF, international law enforcement has seized over two dozen platforms used to carry out Distributed Denial-of-Service (DDoS) attacks. These “booter” (aka ...

PEC “invoice scam” – Stealing time, money, and trust from businesses

PEC stands for “Posta Elettronica Certificata” - a type of legally binding “certified email” used in Italy. It's also a hub of abuse targeting business owners. In this article, we share a real-life case of criminals stealing PEC ...

We must adjust expectations for the CISO role

Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information security officer (CISO) role, once a back-office function primarily focused on technical oversight, has moved squarely ...

Jetico Search locates and manages sensitive data

Jetico launches Search, a PII and sensitive data discovery tool integrated with BCWipe to locate and securely erase files beyond forensic recovery. Addressing the growing demand for effective solutions in data protection, Search integrates ...

Citrix acquires deviceTRUST and Strong Network

With the widespread adoption of hybrid work models, where teams operate across geographical regions on managed and unmanaged devices, every connection and endpoint presents a potential security risk. Addressing this challenge, Citrix announced ...

Only Cynet delivers 100% protection and detection visibility in the 2024 MITRE ATT&CK Evaluation

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To guard against cyber threats and prevent data breaches, it’s vital to ...

Shaping effective AI governance is about balancing innovation with humanity

In this Help Net Security interview, Ben de Bont, CISO at ServiceNow, discusses AI governance, focusing on how to foster innovation while ensuring responsible oversight. He emphasizes the need for collaboration between technologists, ...

Exposed APIs and issues in the world’s largest organizations

In this Help Net Security video, Tristan Kalos, CEO of Escape, discusses the results of its 2024 State of API Exposure report. The study highlights significant API security gaps affecting Fortune 1000 organizations, with over 28,500 exposed APIs ...

Keycloak: Open-source identity and access management

Keycloak is an open-source project for identity and access management (IAM). It provides user federation, strong authentication, user management, authorization, and more. Keycloak is based on standard protocols and supports OpenID Connect, OAuth ...

How to Choose the Right Test Data Management Tools

In today’s fast-paced, compliance-focused world, choosing the right test data management (TDM) tools is vital for development and QA teams. These tools go beyond simple data masking—they manage, secure, and optimize test data across multiple ...

AI: Overhyped or Essential for the Workforce?

The post AI: Overhyped or Essential for the Workforce? appeared first on AI-Enhanced Security Automation. The post AI: Overhyped or Essential for the Workforce? appeared first on Security Boulevard.

Getting Better: Evolving Practices in API Security

Are we Really Securing our Machine Identities? In today’s dynamic world, where businesses increasingly rely on a multitude of applications that drive their operations, API security plays a pivotal role. However, as organizations speed towards ...

Building Confidence with Strategic Secrets Management

Can Strategic Secrets Management Boost Your Confidence? In today’s unpredictable cybersecurity landscape, building confidence in your protections may appear like a challenging endeavour. Yet, the key rests in a proactive and comprehensive ...

Safe Handling of Data: Why Secrets Sprawl is a Risk

Why is Secrets Sprawl a Risk in Data Handling? As cybersecurity continues to evolve at an unprecedented pace, businesses are increasingly becoming aware of the need to secure their digital assets, including data and secrets. Among these, ...