Application Security News and Articles


Carol Shaw: The groundbreaking career of this video game pioneer

Ever flown your jet fighter down the River of No Return to blow up enemy tankers, helicopters, jets and bridges? Then you're familiar with the work of video game pioneer Carol Shaw.   The post Carol Shaw: The groundbreaking career of this video ...

Get to know CMO Tara Ryan | Women’s History Month | Contrast Security

In honor of Women’s History Month, we ask you to transcend species in order to consider the almond.  The post Get to know CMO Tara Ryan | Women’s History Month | Contrast Security appeared first on Security Boulevard.

Fresh Take: A Brief Reflection on the National Cybersecurity Strategy

Earlier this month, the Biden-Harris administration released its much-anticipated National Cybersecurity Strategy, which is a... The post Fresh Take: A Brief Reflection on the National Cybersecurity Strategy appeared first on Axiad. The post ...

Why writing API exploits is important when reporting vulnerabilities

Learn why it's important to include a working exploit in your vulnerability report and how to protect it so others don't weaponize it. The post Why writing API exploits is important when reporting vulnerabilities appeared first on Dana Epp's ...

The Detrimental Impact of Data Silos: Why Unifying Compliance and Risk is Key

Each year, Hyperproof conducts our IT Compliance and Risk Benchmark Survey to uncover the top challenges IT compliance ... Read More The post The Detrimental Impact of Data Silos: Why Unifying Compliance and Risk is Key appeared first on ...

Does your security awareness training include these 5 key things?

The post Does your security awareness training include these 5 key things? appeared first on Click Armor. The post Does your security awareness training include these 5 key things? appeared first on Security Boulevard.

Zoom Paid Out $3.9 Million in Bug Bounties in 2022

Zoom says it paid out $3.9 million in bug bounty rewards in 2022, with a total of over $7 million awarded to researchers since 2019. The post Zoom Paid Out $3.9 Million in Bug Bounties in 2022 appeared first on SecurityWeek.

Unpacking the National Cybersecurity Strategy: Part 2

Dig deeper into the updated National Cybersecurity Strategy to learn more about the Biden/Harris Administration’s plans to help prevent cyber attacks and drive security by design. The post Unpacking the National Cybersecurity Strategy: Part 2 ...

USENIX Security ’22 – Zhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang – ‘CamShield: Securing Smart Cameras Through Physical Replication And Isolation’

Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Security ’22 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX Security ’22 – Zhiwei Wang, Yihui Yan, Yueli Yan, ...

You’ve Got Identity Blindspots in Your Cloud

Reading Time: 5 minutes You’ve got identity blindspots in your cloud. It’s inevitable. But how did we get there? And what are these blindspots? The enterprise departure from on-prem datacenters to cloud changed things. And these fundamental ...

Using Radware ADC Analytics for Application Awareness and Simplified Troubleshooting

As a professional ADC administrator, you know how frustrating it can be to receive a call about application performance issues, especially on the weekend. Whether it's slow response times, connectivity failures, or other glitches, troubleshooting ...

Netography Detection Model Release – March 20, 2023

The Netography Threat Research Team has released its latest detection model updates of several optimizations of existing detections to reduce noise and provide more accurate alerts. The post Netography Detection Model Release – March 20, 2023 ...

The Top 5 Security Risks in Docker Container Deployment

With a goal of easy delivery to the cloud, a docker container packages up code and applications. But is the software package secure? While there are many benefits of utilizing Docker containers, it is also critical to understand the ...

Oleria Scores $8M Seed Funding for ID Authentication Technology

Seattle startup founded by former Salesforce CISO Jim Alkove banks $8 million to build technology in the identity and authentication space. The post Oleria Scores $8M Seed Funding for ID Authentication Technology appeared first on SecurityWeek.

Secrets Exposed: How to mitigate risk from secrets leaks — and prevent future breaches

Leaks and exposures of sensitive information in open source and proprietary code repositories are approaching epidemic proportions. Hardly a week goes by without reports of attacks on firms that leverage credentials, tokens or signing keys found ...

Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant

Mandiant has conducted an analysis of the zero-day vulnerabilities disclosed in 2022 and over a dozen were linked to cyberespionage groups. The post Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant appeared first on ...

Cyral 4.5 Release: Converges DAM, PAM, DLP, and DSPM into Single Solution

Cyral is excited to announce that version 4.5 of the Cyral Platform is now generally available. The latest release of the platform combines the capabilities … The post <strong>Cyral 4.5 Release: Converges DAM, PAM, DLP, and DSPM into ...

2022 witnessed a drop in exploited zero-days

Malicious threat actors have actively exploited 55 zero-days in 2022 – down from 81 in 2021 – with Microsoft, Google, and Apple products being most targeted. 53 out of 55 allowed attackers to achieve elevated privileges or execute ...

Cybersecurity Risk Quantification: A New Way to Understand Risks

Digital fraud and cybersecurity risks are always with us, and they’re constantly changing as businesses open new channels and adopt new technologies that criminals work to exploit. Data breaches are an especially thorny problem, with millions ...

JavaScript Security: Common Vulnerabilities and Practices To Avoid Them

JavaScript is a widely used programming language, primarily used for building web applications. However, JavaScript applications can be…Continue reading on Medium »