Application Security News and Articles


Given Today’s Data Complexity, a Platform Mindset is Crucial for Cyber Recovery

For too long, architecting for cyber recovery and resiliency was on the vision board for a distant future. Unfortunately, that “distant future” is here, but many companies have not started this critical effort. The post Given Today’s Data ...

Defending Against AI-Powered Attacks in a “Spy vs. Spy” World

Although AI can enhance threat detection and response capabilities, it also introduces sophisticated attack vectors that require a rethink of traditional security models. The post Defending Against AI-Powered Attacks in a “Spy vs. Spy” World ...

Enhancing Mobile App API Security: Closing Gaps with a Robust SDK

  The large app sec vendors are only now starting to recognize the mobile gap in their portfolio - that an SDK in mobile apps is needed to eliminate the growing mobile threat. But SDKs differ in how they gather and use contextual signals. This ...

SecureAuth protects sensitive information with biometric continuous identity assurance

SecureAuth is releasing biometric continuous identity assurance (BCIA). This ability is designed to safeguard a company’s sensitive information for the duration of a user’s session — providing additional protection from emerging ...

Cybersecurity Companies Must Practice What They Preach to Avoid the Data Paradox

Cybersecurity companies — traditionally considered pioneers of data innovation — are often the ones struggling to unlock the full potential of the data they collect within their own organizations. The post Cybersecurity Companies Must ...

Balancing Security and Convenience With EV Charging

After years of quiet growth, the electric vehicle (EV) market has kicked into high gear, powered by sustainability trends, technology advances and increased consumer enthusiasm. Earlier this year, a team from Cornell created a new lithium battery ...

SpyLoan Malware: A Growing Threat to Android Users

The rise in android users has transformed how individuals and businesses access financial services, offering convenience and speed like never before. However, this rapid digitalization has also made these platforms a prime target for hackers. ...

PowerDMARC One-Click Auto DNS Publishing with Entri

Simplify DNS management with PowerDMARC's One-Click Auto DNS Publishing powered by Entri. Publish DNS records like DMARC, SPF, DKIM, and more in just one click. The post PowerDMARC One-Click Auto DNS Publishing with Entri appeared first on ...

Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide

What is OSCAL? OSCAL provides a traceable and machine-readable data format for capturing and sharing security information. A standardized, continuous representation of an organization’s security controls helps prove compliance with NIST’s ...

Preventing data leakage in low-node/no-code environments

Low-code/no-code (LCNC) platforms enable application development by citizen developers, often generating “shadow engineering” projects that evade security oversight. While LCNC solutions like Power BI reports and automated workflows foster ...

Strengthening security posture with comprehensive cybersecurity assessments

In this Help Net Security interview, Phani Dasari, CISO at HGS, discusses key aspects of cybersecurity assessments, including effective tools and methodologies, the role of AI and automation, and strategies for aligning assessments with ...

Neosync: Open-source data anonymization, synthetic data orchestration

Neosync is an open-source, developer-centric solution designed to anonymize PII, generate synthetic data, and synchronize environments for improved testing and debugging. What you can do with Neosync Safely test code with production data: ...

NSFOCUS DDoS Protection Service Neutralized a Terabit-Scale DDoS Attack

In Q4 of 2024, NSFOCUS observed and successfully mitigated the largest DDoS attack ever recorded under the cloud-based DDoS Protection Service (DPS). This massive DDoS attack targeted a telecommunications service provider, one of NSFOCUS’s ...

Cybersecurity jobs available right now: December 10, 2024

Cloud Security Engineer Sendbird | USA | Hybrid – View job details As a Cloud Security Engineer, you will work with engineering teams to build secure infrastructure at scale, secure multi-account and multi-cloud infrastructure for ...

Empowering Teams with Secure Cloud Environments

The Forgotten Keyholders: Understanding Non-human Identities in Cybersecurity Have you ever considered who holds the keys to your organization’s most sensitive data? Beyond the human factor in information gatekeeping, machine identities known ...

How Secrets Security Boosts Business Value

Are You Maximizing Your Organization’s Cybersecurity? Cybersecurity is not only a means of information protection but also a valuable strategic asset that can drive business growth and stability. Central to achieving such a valuable level of ...

Leveraging NHI Lifecycle Management for Innovation

How Does NHI Lifecycle Management Promote Innovation? In today’s rapidly evolving digital landscape, innovation is the silver bullet that empowers organizations to thrive amidst relentless competition. But, how does Non-Human Identity (NHI) ...

DEF CON 32 – Compromising Electronic Logger & Creating Truck2Truck Worm

Authors/Presenters: Jake Jepson, Rik Chatterjee Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Surviving the Weekly CVE Review Gauntlet

Every week, IT and security teams gather – be it in a virtual conference room or a cramped huddle space – prepared to spend an hour or two wincing at massive lists of “Critical” and “High” severity vulnerabilities. The vulnerability ...

31 of the Top MSSPs Use D3 for SOC Automation: Here’s Why

Why do 31 of the top 250 MSSPs choose D3? From seamless onboarding to cutting alert noise by 99%, D3's automation revolutionizes managed security. See how. The post 31 of the Top MSSPs Use D3 for SOC Automation: Here’s Why appeared first on D3 ...