Application Security News and Articles


What Is CI/CD Security? Risks and Best Practices

Continuous integration and continuous delivery (CI/CD) pipelines are invaluable in software development. They expedite the deployment process and maintain teams at the forefront of innovation. But with these benefits come unique security ...

Life in the Swimlane with Dylan Dartnell, Professional Services Engineer

The post Life in the Swimlane with Dylan Dartnell, Professional Services Engineer appeared first on AI-Enhanced Security Automation. The post Life in the Swimlane with Dylan Dartnell, Professional Services Engineer appeared first on Security ...

DEF CON 32 – From Getting JTAG On The iPhone 15 To Hacking Apple’s USB-C Controller

Authors/Presenters: Stacksmashing Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

You Have Less Than Two Months to Become DORA Compliant

You have less than two months to become DORA compliant if your company is based in the EU or does business in the EU. The post You Have Less Than Two Months to Become DORA Compliant appeared first on Azul | Better Java Performance, Superior ...

5 Traditional Approaches to Generating Test Data

We’ll discuss five of the most common methods used to date to generate data and how they stack up for use in testing and development. The post 5 Traditional Approaches to Generating Test Data appeared first on Security Boulevard.

Top 10 Static Application Security Testing (SAST) Tools to Strengthen Your Code Security

As businesses increasingly rely on software for operations and services, the security of applications has become a top priority. Static…Continue reading on Medium »

Machine Learning in Cyber Security: Harnessing the Power of Five AI Tribes

Learn about the five key machine learning approaches outlined in the best selling AI book, The Master Algorithm, and their use cases in the field of cybersecurity. The post Machine Learning in Cyber Security: Harnessing the Power of Five AI ...

Randall Munroe’s XKCD ‘Arizona Chess’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Arizona Chess’ appeared first on Security Boulevard.

The Quest to Minimize False Positives Reaches Another Significant Milestone

Our breakthrough ML model FP Remover V2 slashes false positives by 80%, setting a new industry standard for secrets detection. Discover how we're helping security teams focus on real threats instead of chasing phantom alerts. The post The Quest ...

Faraway Russian hackers breached US organization via Wi-Fi

Forest Blizzard, a threat group associated with Russia’s GRU military intelligence service, repeatedly breached a US-based organization via compromised computer systems of nearby firms, which they leveraged to authenticate to the ...

Continuous Compliance Monitoring: Why Is It So Important?

Compliance monitoring is vital to ensure organizations maintain adherence to regulatory standards and internal policies in real time, helping avoid data breaches, legal penalties, and reputational harm. Regulations are constantly... The post ...

Privileged Account Security in Active Directory

Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive systems, data, and administrative tools. These accounts play an essential role in managing access and keeping things running smoothly, but they also ...

DEF CON 32 – Behind Enemy Lines: Going Undercover To Breach LockBit Ransomware Op

Authors/Presenters: Jon DiMaggio Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

OWASP Top 10 for LLM adds risks: Get on target to secure your AI models

The post OWASP Top 10 for LLM adds risks: Get on target to secure your AI models appeared first on Security Boulevard.

How to Reduce Risk From Exposed Secrets

Understand how secrets end up exposed, and how to prevent this risk.  The post How to Reduce Risk From Exposed Secrets appeared first on Security Boulevard.

How to Read, Review, and Analyze a SOC 2 Report

Discover how to maximize the value of your SOC 2 report to enhance your business’s security posture and strengthen trust. The post How to Read, Review, and Analyze a SOC 2 Report appeared first on Scytale. The post How to Read, Review, and ...

Huge Leak of Customer Data Includes Military Personnel Info

EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, ...

Microsoft asks Windows Insiders to try out the controversial Recall feature

Participants of the Windows Insider Program that have a Qualcomm Snapdragon-powered Copilot+ PC can now try out Recall, the infamous snapshot-taking, AI-powered feature that was met with much criticism when it was unveiled earlier this year. ...

Walking the Walk: How Tenable Embraces Its “Secure by Design” Pledge to CISA

As a cybersecurity leader, Tenable was proud to be one of the original signatories of CISA’s “Secure by Design" pledge earlier this year. Our embrace of this pledge underscores our commitment to security-first principles and reaffirms our ...

In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity

Several macro-trends – such as growing digital transformation, rising hybrid work and, especially, booming AI adoption – have created an increasingly sophisticated threat landscape. The post In a Growing Threat Landscape, Companies Must do ...