Application Security News and Articles


Supply chain risk make software stack visibility essential

Visibility into the software that organizations and their suppliers use has become a cornerstone of supply chain security. That's the bottom line from a recent panel discussion among experts at a webinar sponsored by the IT GRC Forum, which ...

Proofpoint helps organizations simplify governance of communication data

Proofpoint introduced its Digital Communications Governance (DCG) offering, bolstering its existing offerings in pace with the evolving modern data governance and enterprise archiving market. The new offering helps organizations simplify ...

Cloud Access Security Brokers (CASBs): Are They Still Relevant?

Understanding how CASBs are developed and how to use them effectively can assist them in safeguarding their cloud-based assets against evolving threats. The post Cloud Access Security Brokers (CASBs): Are They Still Relevant? appeared first on ...

Pool Your Cybersecurity Resources to Build the Perfect Security Ecosystem

Cybersecurity has never been something to set once and leave running in the background — it is a constantly evolving landscape. While the migration of data and applications to the cloud provides numerous business benefits, many organizations ...

Cryptominers in the Cloud

Over the past decade, Bitcoin’s value has increased more than 200-fold. Similarly, other cryptocurrencies have also seen significant The post Cryptominers in the Cloud appeared first on ARMO. The post Cryptominers in the Cloud appeared first on ...

Bitdefender Security for Creators protects YouTube content creators and influencers from hackers

Bitdefender unveiled Bitdefender Security for Creators, a service specifically designed for digital content producers, online creative professionals and social media influencers who are prime targets for account takeovers, fraud, and other ...

The impact of 90-day SSL certificates on enterprise security

SSL/TLS certificates are vital for enterprise cybersecurity, providing encryption and authentication. Proper management throughout their lifecycle is crucial, especially with the upcoming 90-day validity periods that reduce risk exposure and ...

Revenera OSS Inspector enables developers to assess open source software risks

Revenera announced OSS Inspector, a comprehensive, time-efficient approach to open source software (OSS) management. The Revenera OSS Inspector plugin enables developers using IntelliJ IDEA, an integrated development environment (IDE), to ...

Microchip Technology confirms theft of employee data

US-based semiconductor manufacturer Microchip Technology has confirmed that the cyberattack it suffered in August 2024 resulted in the theft of data, including “employee contact information and some encrypted and hashed passwords.” ...

High-Severity Intel Microcode Vulnerabilities Fixed in Ubuntu

Recently, multiple high-severity vulnerabilities were discovered in Intel Microcode that could potentially lead to privilege escalation. Canonical, the organization behind Ubuntu, has acted swiftly by releasing security updates to address these ...

Skyhigh AI mitigates risks associated with AI applications

Skyhigh Security unveiled Skyhigh AI, an advanced suite of AI-powered capabilities within its Security Service Edge (SSE) platform designed to elevate organizations’ security posture. Skyhigh AI significantly reduces the risks associated with ...

Binarly Transparency Platform 2.5 identifies critical vulnerabilities before they can be exploited

Binarly announced Binarly Transparency Platform 2.5 with several features designed to enhance software vulnerability management and improve security posture across enterprise environments. The key highlight of this release is the innovative ...

Moscow Hacker Extradited To US For Cybercrime Involvement

As per recent reports, a Moscow hacker has been charged in the US on various accounts of cybercrime. Charges leveled against the hacker include allegedly stealing data, extorting victims, and laundering ransom payments since 2021. In this ...

The Evolution of Identity and Access Management (IAM)

The Evolution of Identity and Access Management (IAM) madhav Thu, 09/05/2024 - 05:03 The evolution of Identity and Access Management (IAM) has been a fascinating journey, shaped by technological advancements, security challenges, and evolving ...

The future of automotive cybersecurity: Treating vehicles as endpoints

The automotive industry is facing many of the same cybersecurity risks and threats that successful organizations in other sectors are up against, but it’s also battling some distinct ones. In this Help Net Security interview, Josh Smith, ...

How to gamify cybersecurity preparedness

Organizations’ preparedness and resilience against threats isn’t keeping pace with cybercriminals’ advancements. Some CEOs still believe that cybersecurity requires episodic intervention rather than ongoing attention. That isn’t the ...

Enterprise DSPM for Fortune 500 – 1touch.io is your go-to solution

In this Help Net Security video, Jesse Sedler, VP of Product at 1touch.io, provides a compelling overview of the company’s innovative data security posture management solutions. Founded in 2017 by industry veterans, 1touch.io leverages ...

vCISO services thrive, but challenges persist

While 75% of service providers report high customer demand for vCISO functionality, a new Cynomi report reveals that only 21% are actively offering it—opening a window onto a growth area for service providers while emphasizing the growing ...

A Powerful Approach to SaaS ITDR – Avoiding False Positives on Improbable Travel

In the world of SaaS ITDR, the journey taken matters. There are solutions that began from an ITDR perspective. They built threat-hunting capabilities to parse through any data set, look for anomalies, and flag any activity that looks ...

News alert: AI SPERA attains PCI DSS certification for its search engine solution ‘Criminal IP’

Torrance, Calif., Sept. 4, 2024, CyberNewsWire — AI SPERA, a leading Cyber Threat Intelligence (CTI) company, has achieved PCI DSS v4.0 certification for its flagship search engine solution, Criminal IP. This accomplishment builds on last ...