Application Security News and Articles


Kubernetes 1.32 – A Security Perspective

Kubernetes continues to evolve its security posture with version 1.32, introducing several significant improvements in authentication, authorization, and The post Kubernetes 1.32 – A Security Perspective appeared first on ARMO. The post ...

The Role of USB Security in Combating Insider Threats

This blog post explores how maintaining USB security mitigates insider threats and fosters a secure workplace environment. The post The Role of USB Security in Combating Insider Threats appeared first on Security Boulevard.

Quantum Computing: An Impending Threat to the Current PKI Systems

By proactively assessing vulnerabilities and planning for the integration of quantum-resistant cryptographic solutions, enterprises can safeguard their digital assets against future threats. The post Quantum Computing: An Impending Threat to the ...

How to Make the Case for Network Security Audits

Despite the increase in cybersecurity threats, many organizations overlook regular audits, risking costly data breaches and compliance violations. However, auditing network security is no longer just an option—it’s a necessity.... The post ...

5 Tips to Translate High-Level Risk Into Daily Operations

By following these five tips and leveraging a cybersecurity data fabric with an automated metrics layer, organizations can unify their risk assessment and operational efforts, leading to more cohesive and efficient risk management. The post 5 ...

TPM 2.0: The new standard for secure firmware

Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM 2.0 specification from the Trusted Computing Group (TCG). Manufacturers attach a Trusted Platform Module (TPM) to a device ...

Automated Compliance Evidence: Types and How to Choose the Right One

You’re in the middle of an audit, and it’s the usual drill: toggling between spreadsheets, email chains, and access logs, while your fingers automatically find Ctrl+PrtSc to grab evidence for auditors. The back-and-forth is ...

Understanding Rockstar 2FA and the Evolution of Phishing-as-a-Service

The fight to protect digital systems from cyber criminals grows more challenging every day, especially with the rise of sophisticated tools like the recently discovered Rockstar 2FA phishing-as-a-service kit. Featured in a recent article from ...

Who handles what? Common misconceptions about SaaS security responsibilities

In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What ...

Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book

Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. ...

What makes for a fulfilled cybersecurity career

In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that are interested in pursuing it as a career. The post What makes for a ...

Top cybersecurity books for your holiday gift list

The holiday season is approaching, and with it, the tradition of gift-giving. For professionals and enthusiasts alike, a well-chosen book can provide both knowledge and inspiration. To help with ideas on what to give, we’ve compiled a list ...

Businesses plagued by constant stream of malicious emails

36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their security services between November 1, 2023 and October 31, 2024 – ...

Why Compliance in Cloud Security Can’t Be Ignored

How Does Compliance Impact Cloud Security? Are we fully conscious of the significant correlation between compliance and cloud security? With the increasing reliance on cloud-based solutions, the challenge of maintaining security compliance in the ...

Compliance in Cloud Security

Is Your Cloud Security Compliant? With increasing reliance on cloud systems across industries, it’s time to ask hard-hitting questions. Is your cloud security up to par? Are your Non-Human Identities (NHIs) effectively managed? As businesses ...

Ensuring Calm with Effective Secrets Scanning Techniques

Are You on the Safe Side with Your Secrets Scanning? In the realm of cybersecurity, there’s a formidable challenge to be tackled: the management of Non-Human Identities (NHIs) and Secrets. This entails not only securing these machine identities ...

Transform IAM From Technology Burden To Business Advantage

Transform IAM from a burden to a business advantage. Discover how strategic IAM enables agility, reduces risk, and drives digital transformation success. The post Transform IAM From Technology Burden To Business Advantage first appeared on ...

DEF CON 32 – Clash, Burn And Exploit Manipulate Filters To Pwn kernelCTF

Authors/Presenters: HexRabbit Chen Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

From Europe to South Africa: Where Is the World on Cyber Defense?

As we wrap up 2024, two new reports suggest that Europe and leading African nations share many of the same cyber threats and potential cybersecurity solutions as their U.S. counterparts. The post From Europe to South Africa: Where Is the World on ...

Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449) Veeam has fixed two vulnerabilities in Veeam Service ...