Application Security News and Articles


AppOmni partners with Cisco to extend zero trust to SaaS

AppOmni announced a significant partnership that combines the company’s Zero Trust Posture Management (ZTPM) solution with Cisco’s Security Service Edge (SSE) technology suite to enable zero trust principles at the application layer in ...

Apple’s 45-day certificate proposal: A call to action

In a bold move, Apple has published a draft ballot for commentary to GitHub to shorten Transport Layer Security (TLS) certificates down from 398 days to just 45 days by 2027. The Apple proposal will likely go up for a vote among Certification ...

Am I Isolated: Open-source container security benchmark

Am I Isolated is an open-source container security benchmark that probes users’ runtime environments and tests for container isolation. The Rust-based container runtime scanner runs as a container, detecting gaps in users’ container ...

A closer look at the 2023-2030 Australian Cyber Security Strategy

In this Help Net Security video, David Cottingham, CEO of Airlock Digital, discusses the 2023-2030 Australian Cyber Security Strategy and reviews joint and individual cybersecurity efforts, progress, and strategies over the past year. The ...

Why AI-enhanced threats and legal uncertainty are top of mind for risk executives

AI-enhanced malicious attacks are the top emerging risk for enterprises in the third quarter of 2024, according to Gartner. Key emerging risks for enterprises It’s the third consecutive quarter with these attacks being the top of emerging risk. ...

New infosec products of the week: November 8, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Atakama, Authlete, Symbiotic Security, and Zywave. Atakama introduces DNS filtering designed for MSPs Atakama announced the latest expansion of its ...

Highlights from the InCyber Montreal Forum

I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding! I bumped into Dan Lohrmann and Nancy Rainosek before their panel with Sue McCauley on CISO challenges. We had some ...

From Data to Cloud: Bridging Security Gaps with DSPM and CSPM

Over the past few years, businesses have rapidly expanded their digital infrastructure to accommodate distributed workforces and implemented a slew of modernization initiatives to bring them into the digital era. This has fueled a shift from ...

DEF CON 32 – QuickShell Sharing Is Caring About RCE Attack Chain On QuickShare – Or Yair, Shmuel Cohen

Authors/Presenters: Or Yair, Shmuel Cohen Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

The Future of Work: Understanding AI Agents and Digital Coworkers

The AI agents and digital coworkers are automating tasks, enhancing productivity, and changing the way we collaborate. This post delves into the transformative impact of AI on the future of work, exploring the benefits, challenges, and potential ...

The Global Effort to Maintain Supply Chain Security | Part Two

Various Cybersecurity Experts, CISO Global A well-run kitchen requires a fully stocked pantry and a clear understanding of what’s on hand. In cybersecurity, your pantry is your asset inventory—every server, every piece of software, and even ...

A Critical Guide to Securing Large Language Models

A Critical Guide to Securing Large Language Models glenn.hamilton… Thu, 11/07/2024 - 18:07 Securing large language models (LLMs) presents unique challenges due to their complexity, scale, and data interactions. Before we dive into securing ...

Randall Munroe’s XKCD ‘Probabilistic Uncertainty’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Probabilistic Uncertainty’ appeared first on Security Boulevard.

Bot Attacks Are Coming to Town: How to Safeguard Your Customers’ Holiday Travel

Travel accounts and platforms provide juicy targets for fraudsters, particularly around holidays. Learn how to identify threats and keep your customers' travel plans safe. The post Bot Attacks Are Coming to Town: How to Safeguard Your ...

Fortinet Extends Generative AI Reach Across Portfolio

Fortinet today extended the reach of its generative artificial intelligence (AI) capabilities to include support for its network detection and response (NDR) and cloud native application protection platform (CNAPP). The post Fortinet Extends ...

The Story of BIX, a Specialized AI Agent for Cybersecurity, Built with NVIDIA AI

 BIX isn’t just an AI assistant—it’s a game-changer in cybersecurity. With BIX, organizations can instantly get clear, actionable answers on everything from vulnerabilities to threat analysis and risk mitigation, transforming massive data ...

DEF CON 32 – Windows Downdate: Downgrade Attacks Using Windows Updates

Authors/Presenters: Alon Leviev Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack 

Threat actors are becoming increasingly creative, using vulnerabilities to infiltrate organizations in ways that might not immediately raise alarms. Veriti’s research team recently discovered a targeted email campaign utilizing CVE-2024-38213, ...

AppOmni and Cisco Partner to Extend SaaS Security with End-to-End Zero Trust From Endpoint to the Application

AppOmni announced a partnership that combines the company’s Zero Trust Posture Management (ZTPM) solution with Cisco’s Security Service Edge (SSE) technology suite. The post AppOmni and Cisco Partner to Extend SaaS Security with End-to-End ...

Prevent Security Breaches in Self-Hosted Environments with GitGuardian’s Custom Host for Validity Checks

Stop chasing false positives in your self-hosted instances. With GitGuardian's custom host for validity checks, security teams get real-time insights to prioritize active threats, reduce noise, and prevent costly breaches. The post Prevent ...