Application Security News and Articles
OpenText added a threat detection module to its core platform that makes use of artificial intelligence to more accurately surface anomalies.
The post OpenText Adds AI Threat Detection Module to Platform appeared first on Security Boulevard.
A group of financial organizations is asking CISA to rescind and reissue its proposed implementation of CIRCIA.
The post Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation appeared first on SecurityWeek.
As the digital era ushers in the proliferation of Web3 technologies, the security of digital assets becomes a paramount concern not just for investors but for anyone venturing into the realm of digital currencies. The shift from government-backed ...
S04 EP 03: Dave and Dr. Zero Trust weigh the difference between delivering refined news and raw perspective, hitting critical mass for AI, and the current political environment.
The post Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. ...
A second iteration of the BadBox botnet that affected over one million Android devices has been partially disrupted.
The post BadBox Botnet Powered by 1 Million Android Devices Disrupted appeared first on SecurityWeek.
AIceberg has launched a solution that helps governments and enterprises with the safe, secure and compliant adoption of AI.
The post AIceberg Gets $10 Million in Seed Funding for AI Security Platform appeared first on SecurityWeek.
Scans show that tens of thousands of VMware ESXi instances are affected by CVE-2025-22224 and other vulnerabilities disclosed recently as zero-days.
The post Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks appeared first ...
Riskified launched Adaptive Checkout, a solution designed to drive higher conversion rates by not falsely declining good orders while also mitigating fraud for ecommerce merchants. This configuration of Riskified’s Chargeback Guarantee product ...
Web scraping is no longer just about collecting raw data. AI transforms this data, embedding it into machine learning models that can generate insights, predict behaviors and even infer new information about individuals in ways that were never ...
BreachRx this week added generative artificial intelligence (GenAI) capabilities to a security incident platform that promises to streamline workflows across all the stakeholders that need to collaborate.
The post BreachRx Brings Generative AI to ...
Enacted in 1977, the Foreign Corrupt Practices Act (FCPA) was designed to curb corruption by prohibiting U.S. companies, subsidiaries, and representatives from offering bribes to foreign officials to gain or retain business. What began as a ...
In recent years, collaboration tools have become an absolute necessity for remote and hybrid work. This primarily increased during the COVID-19 pandemic due to the impossibility of communicating in person. So, tools like Slack, Microsoft Teams, ...
Discover essential reads for CISOs in this curated list of books covering cybersecurity leadership, risk management, zero trust, board communication, and more. Why CISOs Fail, 2nd Edition Author: Barak Engel Barak Engel expands on the ideas from ...
Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal non-corporate accounts. Among logins using corporate accounts, 58% of ...
Large enterprises operate complex IT environments, balancing legacy on-premises applications with modern cloud services. Over time, they have accumulated multiple identity providers (IDPs) like Microsoft Entra ID, Okta, and Ping Identity to ...
Are CIOs Prepared for the Rising NHI Trends? When the cloud environment evolves to deliver seamless business solutions, it brings along unique challenges in terms of data security. Needless to say, managing Non-Human Identities (NHIs) has become ...
Are Unmanaged Non-Human Identities (NHIs) Jeopardizing Your Enterprise Environment? With cloud-native applications, AI technologies, and IoT devices permeating modern enterprises, Non-Human Identities (NHIs) have become critical components. But ...
Why is Compliance Crucial for Non-Human Identities? Executive teams often face an array of complex challenges. One such challenge concerns Non-Human Identities (NHIs) compliance. So, why is it essential to get this right? Non-Human Identities are ...
In today’s fast-evolving regulatory landscape, Chief Information Security Officers (CISOs) are under immense pressure. With increasing legal scrutiny, evolving SEC regulations, and rising personal liability concerns, CISOs must take ...
There’s been quite a few hacks, takedowns-arrests-leaks, and insights from the Identity Theft Resource Center (ITRC) 2024 Breach Report. Dive into the most pressing recent stories on data leaks, cybercrime, and the dark web with security ...