Application Security News and Articles


eBook: Cloud security skills

Demonstrating a sound understanding of cloud security key principles and practices opens various professional opportunities. But first, you need the right mix of technical and soft skills to emerge as a leader. Inside this eBook: Why a career in ...

Miggo Unfurls Real-Time Application Detection and Response Platform

The platform analyzes application interactions to identify cyberattacks and applies mitigations to limit the attack's impact. The post Miggo Unfurls Real-Time Application Detection and Response Platform appeared first on Security Boulevard.

Test & Evaluation Techniques for Meeting M-24-10 Mandates to Manage Generative AI Risk

Overview The release of the National Institute of Standards and Technology (NIST)’s AI Risk Management Framework (AI RMF) helped put a framework around how testing would enable organizations to manage and mitigate AI risks. While testing is ...

From Caesar to Cyberspace: The Growing Menace of Obfuscated Phishing Scams

In the world of cybersecurity, it often feels like we’re revisiting familiar problems, albeit with a modern twist. The essence of the issue isn’t about the emergence of entirely new types of cyberattacks but rather how attackers ingeniously ...

HHS Strengthens Privacy of Reproductive Health Care Data

The Biden Administration is issuing new regulations designed to protect women and their health care providers from law enforcement investigations when performing abortions or other reproductive procedures that are lawful in the states where ...

High-Risk Customers: How to Identify & Mitigate Risky Clients

High-risk customers can endanger your business. Learn how to identify and manage 7 different kinds of high-risk customers to maintain a secure business environment. The post High-Risk Customers: How to Identify & Mitigate Risky Clients ...

Bridging the Skills Gap in Data Centers with DCIM Software

The rapid evolution of technology and increasing reliance on digital infrastructure highlight a critical challenge facing the data center industry: a growing skills gap and talent shortage. As organizations struggle to find qualified ...

Who Are APT29?

Russian hacker group APT29 is one of the most technically skilled and organized threat actors... The post Who Are APT29? appeared first on Security Boulevard.

USENIX Security ’23 – ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles

Authors/Presenters: *Sangdon Park, Osbert Bastani, Taesoo Kim* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

Top 10 Reasons to Visit Aembit at RSA Conference 2024

3 min read If this definitive list doesn't convince you to pay us a visit, learn about Workload IAM, and meet the people behind the product, nothing will. The post Top 10 Reasons to Visit Aembit at RSA Conference 2024 appeared first on ...

UnitedHealth: Ransomware Attackers Stole Huge Amount of Data

The ransomware group that attacked a subsidiary of UnitedHealth Group stole massive amounts of customers’ private health care data, the latest in a continuing string of information coming out about the data breach. In a statement this week, ...

TrustCloud’s New Hallucination-Proof GraphAI Shaves Hours Off Security Questionnaires

TrustCloud’s AI already pre-fills up to 80% of a security questionnaire, but we’ve developed the next iteration. TrustShare has built new generative AI capabilities called GraphAI. GraphAI will still find the right answer for a security ...

Oak Ridge, McCrary Institute Establish Cybersecurity Center Focused on Electrical Grid

In addition to supporting research centers, the $12.5 million project focuses on training the next generation of cybersecurity pros to safeguard the nation's critical infrastructure.  The post Oak Ridge, McCrary Institute Establish Cybersecurity ...

PuTTY SSH Client Vulnerability Allows Private Key Recovery

The recent discovery of a critical vulnerability in the PuTTY SSH and Telnet client, identified as CVE-2024-31497, has raised significant concerns among IT professionals and developers. Read on to get the details.   Tell me more about the PuTTY ...

5 Tips for API Hackers on Picking Your First Target

Check out these five tips to help you pick your first target when starting bug bounty hunting against APIs. The post 5 Tips for API Hackers on Picking Your First Target appeared first on Dana Epp's Blog. The post 5 Tips for API Hackers on Picking ...

Invicti Predictive Risk Scoring identifies highest-risk applications

Invicti announced its new AI-enabled Predictive Risk Scoring capability. The feature assigns predicted risk to applications and helps organizations gain a strategic view of their overall application security risk. Predictive Risk Scoring allows ...

Forcepoint DSPM safeguards sensitive information by examining data context and content

Forcepoint has launched Forcepoint Data Security Posture Management (DSPM), driven by AI to deliver real-time visibility, ease privacy compliance and minimize risks for data stored in multi-clouds and networks, including endpoints. Forcepoint ...

TuxCare Names Glen Kuhne as Vice President of Enterprise Sales

PALO ALTO, Calif. – April 23, 2024 – TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced that Glen Kuhne now serves as vice president of enterprise sales. Kuhne previously served as TuxCare’s enterprise ...

Entrust protects users against fraud, phishing and other account takeover attacks

Entrust announced a single-vendor enhanced authentication solution that integrates identity verification (IDV) and identity and access management (IAM) to fight deepfakes, phishing, account takeover (ATO) attacks and other threats. By enhancing ...

Fairwinds Insights Release Notes 15.5.1-15.6.0: Policy Mappings

This month, we’ve made some updates to Fairwinds Insights that make it easier for you to manage policy and guardrails at scale across multiple clusters. Let’s explore these new capabilities and how they allow you to target certain resources ...