Application Security News and Articles


CrowdStrike Software Update Sparks Microsoft Outage, Global Chaos

A faulty software update by CrowdStrike knocked Microsoft Windows users off of their systems, resulting in global outages that rippled through a broad range of businesses, from airlines and banks to hospitals and payment systems. The post ...

Cybersecurity Insights with Contrast CISO David Lindner | 7/19/24

Insight #1 It's been a while since I reminded everyone that one of the single greatest controls to implement to prevent account compromise is multifactor authentication (MFA). Do it today! The post Cybersecurity Insights with Contrast CISO David ...

Google Threat Horizon Analysis

The Google Threat Horizons report found that cloud computing services are facing increasing threats of compromise and abuse. The post Google Threat Horizon Analysis appeared first on Security Boulevard.

Understanding the NIST Cybersecurity Framework: A Comprehensive Guide

Reading Time: 4 min Protect your organization from cyber threats with the NIST Cybersecurity Framework and it’s core functions - Identify, Protect, Detect, Respond, Recover. The post Understanding the NIST Cybersecurity Framework: A ...

The Ultimate Guide to Managing Cyber Security Risks

Cyber risk management has taken center stage for managing and assessing cybersecurity. Security professionals who have taken a risk-first approach to replacing legacy GRC tools have done so for several reasons. Cybersecurity is a very real ...

What are Update Rings and Why are they Important? 

Keeping IT environments up-to-date with the latest software patches and updates is crucial for maintaining security, stability and performance. As anRead More The post What are Update Rings and Why are they Important?  appeared first on ...

Worldwide Outages Caused by CrowdStrike Security Tool

BSODs beyond belief: A buggy update to CrowdStrike Falcon made Windows PCs and servers crash—globally. The post Worldwide Outages Caused by CrowdStrike Security Tool appeared first on Security Boulevard.

Two of Wallarm’s Open-source Tools Have Been Accepted into Black Hat Arsenal 2024

We're gearing up with some seriously cool stuff for Black Hat! But first, a little sneak peek - not just one, but TWO of Wallarm's open-source tools will be featured in the Arsenal showcase at Black Hat USA this year. Black Hat Arsenal unites ...

Forcepoint GenAI Security prevents unauthorized data sharing

Forcepoint unveils its comprehensive GenAI Security solution, offering visibility, control, and risk-based data protection across generative AI platforms, including integration with OpenAI’s ChatGPT Enterprise Compliance API. Part of ...

Netskope extends risk management to OpenAI’s ChatGPT Enterprise

Netskope announced an integration with OpenAI‘s ChatGPT Enterprise Compliance API to deliver API-enabled controls that bolster security and compliance for enterprise organizations using generative AI (genAI) applications. Through this ...

Faulty CrowdStrike update takes out Windows machines worldwide

Houndreds of housands and possibly millions of Windows computers and servers worldwide have been made inoperable by a faulty update of Crowdstrike Falcon Sensors, and the outage affected transport, broadcast, financial, retail and other ...

Streamline User Management with LDAP Integration for Linux

Robust user authentication is essential for cybersecurity, preventing unauthorized access to systems and resources. LDAP (Lightweight Directory Access Protocol) provides a centralized solution for this challenge in Linux environments. By storing ...

Sleep More, Worry Less with Automated Detection and Monitoring of New VNets and VPCs

“The scariest thing in the world is a developer with a credit card” -CISO, F500 FinTech. VPCs and VNets spinning up without the knowledge of SecOps, NetOps, or CloudOps teams can give CISOs nightmares. All it takes is a few clicks in the ...

Juniper Networks Critical Security Update Released

Recent media reports have stated that a Juniper Networks vulnerability that could have led to an authentication bypass if exploited has now been patched. The authentication bypass flaw affects routers that operate in high-availability redundant ...

Importance of Vulnerability Assessment: Types and Methodology

A vulnerability assessment involves identifying, classifying, and prioritizing security vulnerabilities within an IT infrastructure. This comprehensive evaluation determines if an IT system is susceptible to known vulnerabilities. It also assigns ...

GenAI network acceleration requires prior WAN optimization

As GenAI models used for natural language processing, image generation, and other complex tasks often rely on large datasets that must be transmitted between distributed locations, including data centers and edge devices, WAN optimization is ...

One-third of dev professionals unfamiliar with secure coding practices

Attackers consistently discover and exploit software vulnerabilities, highlighting the increasing importance of robust software security, according to OpenSSF and the Linux Foundation. Despite this, many developers lack the essential knowledge ...

CISOs must shift from tactical defense to strategic leadership

Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the expansion of attack surfaces through interconnected systems and devices, ...

New infosec products of the week: July 19, 2024

Here’s a look at the most interesting products from the past week, featuring releases from AuditBoard, BlueVoyant, Druva, Invicti Security, and Rezonate. AuditBoard’s self-assessment tools allow audit teams to maintain focus on their critical ...

SARIF JSON Parser and converter tool

Streamline Your Security Analysis with the SARIF JSON Parser and SARIF to Excel ConverterContinue reading on Medium »