Application Security News and Articles
TXOne Networks announced an expanded new version of its SageOne OT Cybersecurity Governance Platform. Already relied upon by many industrial leaders across sectors with exacting cybersecurity requirements, TXOne SageOne has been enhanced to ...
Zscaler announced a new suite of solutions that enable customers to adopt zero trust everywhere. These innovations extend the reach of true zero trust and enable businesses to modernize and scale securely by providing end-to-end segmentation ...
Varonis announced Varonis Identity Protection, the latest enhancement to its Data Security Platform that gives organizations visibility and control of data and identities. Most identity security tools operate in a vacuum — with no understanding ...
A recent Hacker News post looked at the reverse engineering of TikTok’s JavaScript virtual machine (VM). Many commenters assumed the VM was malicious, designed for invasive tracking or surveillance.
But based on the VM’s behavior and string ...
Latest enhancements to OpenAI's Codex and Agents SDK, empowering developers with AI-driven coding solutions. Learn more today!
The post OpenAI Enhances Codex and Agents SDK for Improved AI Development appeared first on Security Boulevard.
Major Coinbase breach involving a significant customer data leak. Stay informed and protect your assets. Read more!
The post Coinbase Aware of Data Breach Since January, Report Reveals appeared first on Security Boulevard.
Power of Anthropic's Claude 4 models for coding and task management. Enhance productivity with cutting-edge AI solutions today!
The post Anthropic Unveils Claude 4 Family and New AI Models appeared first on Security Boulevard.
According to research, 62% of organizations said their attack surface grew over the past year. It’s no coincidence that 76% of organizations also reported a cyberattack due to an exposed asset in 2024, as expanding digital footprints often ...
Gemini Nano APIs empower Android developers with on-device AI features like summarization, proofreading, and enhanced privacy. Get started today!
The post Google Unveils Gemini Nano for On-Device AI in Android Apps appeared first on Security ...
Large language models (LLMs) have come a long way from the once passive and simple chatbots that could respond to basic user prompts or look up the internet to generate content. Today, they can access databases and business applications, interact ...
Beijing, China, 4th June 2025, CyberNewsWire
The post ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR) appeared first on Security Boulevard.
In this Help Net Security interview, Thomas Squeo, CTO for the Americas at Thoughtworks, discusses why traditional security architectures often fail when applied to autonomous AI systems. He explains why conventional threat modeling needs to ...
Trustifi has raised $25 million in Series A funding to accelerate its product roadmap and go-to-market initiatives.
The post Trustifi Raises $25 Million for AI-Powered Email Security appeared first on SecurityWeek.
Decentralized identity (DID) is gaining traction, and for CISOs, it’s becoming a part of long-term planning around data protection, privacy, and control. As more organizations experiment with verifiable credentials and self-sovereign ...
Many organizations are overwhelmed by the complexity of their IT systems, making it difficult to manage cybersecurity risks, according to a new Ivanti report. The “Exposure Management: From Subjective to Objective Cybersecurity” ...
Infosecurity Europe 2025 is a cybersecurity event taking place from June 3 to 5 in London. Help Net Security is on-site and here’s a closer look at the conference. The first gallery is here. The featured vendors are: Bitdefender, Qualys, ...
Prevent, detect, and respond to identity threats across all SaaS with Grip's ITDR 2.0 product.
The post Stay Ahead of Identity Threats with Grip ITDR 2.0 | Grip appeared first on Security Boulevard.
AI agents are no longer just experiments — they’re becoming embedded in the way modern enterprises operate. From processing transactions to coordinating logistics, agents are increasingly acting on behalf of people and systems. But here’s ...
Is Your Organization Grappling with Secrets Sprawl? If you’re a cybersecurity professional, you’ve likely dealt with secrets sprawl at some point. This phenomenon occurs within organizations when multiple systems, applications, and services ...
What’s the Real Value of Your IAM Investment? For many organizations, Identity and Access Management (IAM) has been touted as the cornerstone of their cybersecurity strategy. But as a seasoned data management expert and cybersecurity specialist ...