Application Security News and Articles


Columbus Sues Expert, Fueling Debate About Ransomware Attack

City officials in Columbus, Ohio, filed a complaint against a cybersecurity expert who has been telling local media that the sensitive data stolen by the Rhysida group in a July ransomware attack poses a larger threat to residents and employees ...

Talking DSPM: Episode 2 – Cecil Pineda

https://youtu.be/SG1Rd3SY40I Q: Welcome, Cecil. Thank you for joining us today. To start, could you share a bit about your journey... The post Talking DSPM: Episode 2 – Cecil Pineda appeared first on Symmetry Systems. The post Talking DSPM: ...

USENIX Security ’23 – Speculation At Fault: Modeling And Testing Microarchitectural Leakage Of CPU Exceptions

Authors/Presenters:Jana Hofmann, Azure Research, Microsoft; Emanuele Vannacci, Vrije Universiteit Amsterdam; Cédric Fournet, Boris Köpf, and Oleksii Oleksenko, Azure Research, Microsoft Many thanks to USENIX for publishing their outstanding ...

Randall Munroe’s XKCD ‘Sky Alarm’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Sky Alarm’ appeared first on Security Boulevard.

200 Episodes of the Host Unknown Podcast

What started off as a vision I had many years ago has hit a significant milestone. The Host Unknown Podcast has somehow managed to stumble its way to 200 episodes. It’s a feat that probably a testament to the sheer stubbornness of my co-hosts ...

Multicloud Security Architecture

Using multiple cloud service providers isn't all benefits, it has its challenges. Today, let's have a look at multicloud: What it is, what are the challenges, especially security challenges, and what are the best practices towards a secure ...

Iran Cyber Threat Resource Center: How to Navigate Amid Geopolitical Conflicts and Tensions

Multiple types of organizations around the world are currently facing heightened threats from Iran-aligned cyber actors. Researchers continue to report significant increases in Iran-aligned threat activity well after the start of the Israel-Hamas ...

USENIX Security ’23 – Ultimate SLH: Taking Speculative Load Hardening To The Next Level

Authors/Presenters:Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...

USENIX Security ’23 – Ultimate SLH: Taking Speculative Load Hardening To The Next Level

Authors/Presenters:Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...

Ever-Increasing Data Breach Costs: Why and What to Do

Data breach costs keep rising—it’s a perennial occurrence at this point to see these types of statements. But it doesn’t necessarily need to be the default for this trend to continue. In fact, you could argue that frequent reports, warnings ...

Protecting Your Digital Identity from Account Takeover – 10 Tips

Protecting your online identity is more crucial than ever. Account takeover, where cybercriminals gain unauthorized access to your online accounts, can lead to severe consequences, including financial loss, reputational damage, and personal ...

Navigating new regulations and the role of SBOMs in software security

Recently in our webinar series with Amazon Web Services (AWS) and Fortify by OpenText™, our third installment, "The Power of SBOMs: Regulations Looming," brought the panel together to discuss the evolving role of software bills of materials ...

Ping Identity strengthens security for federal agencies and government suppliers

Ping Identity announced the addition of key identity capabilities to its FedRAMP High & DoD IL5 offerings. With Ping Government Identity Cloud, federal agencies and government suppliers now have access to capabilities that enable them to ...

Microsoft-CrowdStrike Outage Explained

In a recent podcast interview with Cybercrime Magazine's host, David Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, discusses the July 2024 CrowdStrike outage, explaining what happened and ...

Why NTIA Support of Open-Source AI is Good for Security

A fully open model — one where the training data is available for inspection and modification — provides a means for addressing another threat: malicious or accidentally bad training data. The post Why NTIA Support of Open-Source AI is Good ...

The Evolution of Threat Hunting

According to Nearly 300 Security Practitioners One of the best ways to proactively protect your organization is through threat hunting.... The post The Evolution of Threat Hunting appeared first on Security Boulevard.

Veeam Software expands protection for Microsoft 365

Veeam Software announced Veeam Backup for Microsoft 365 v8, which delivers comprehensive and flexible immutability for Microsoft 365 data. Now organizations can ensure their Microsoft 365 data is resilient employing a zero-trust, multi-layered ...

Snyk Allies With Snowflake to Improve Data Security

Snyk and Snowflake have allied to make it simpler for cybersecurity teams to analyze the security posture of their IT environments using data hosted in the cloud. The post Snyk Allies With Snowflake to Improve Data Security appeared first on ...

Kara Sprague joins HackerOne as CEO

HackerOne announced that it has appointed Kara Sprague to succeed Marten Mickos as CEO. Sprague joins HackerOne at a powerful moment in its evolution, having seen 200% product growth in its pentesting and AI red teaming business and 120% growth ...

SaaS Security: Are You Moving Fast Enough?

The slow adoption of SaaS security could catch organizations off guard because SaaS operates at a different pace than traditional software. The post SaaS Security: Are You Moving Fast Enough? appeared first on Security Boulevard.