Application Security News and Articles
In today’s thoroughly digital world, technology decisions are business decisions, with cybersecurity standing out as a crucial area where this dynamic unfolds. It’s no longer just a box for IT
Read More
The post Why Every Enterprise Needs a ...
In a world in which cyberattacks have become both more frequent and costly, organizations are under growing pressure to manage digital threats more effectively. Cyber Risk Quantification (CRQ), a means
Read More
The post Why Traditional CRQ Falls ...
In a thoroughly digital world, cyber incidents can have a huge financial impact, with the average cost of a data breach skyrocketing to $4.88 million. Still, too many businesses struggle
Read More
The post Why CRQ Methodologies Should Be Usable, ...
Join this panel of CISOs and threat-intel professionals for a deep-dive on aligning incident response and threat intelligence with broader business objectives.
The post CISO Forum Webinar: Defenders on the Frontline – Incident Response and ...
Nearly two dozen new macOS malware families were observed in 2024, including stealers, backdoors, downloaders and ransomware.
The post 22 New Mac Malware Families Seen in 2024 appeared first on SecurityWeek.
This week, AttackIQ acquired DeepSurface to broaden its vulnerability and attack path management capabilities to help enterprises identify and mitigate the most pressing vulnerabilities in their environments. The acquisition enables AttackIQ to ...
The latest wave of artificial intelligence (AI) improvements significantly improved the quality of models for image and text generation. Several companies, such as OpenAI (ChatGPT) and Claude provide services, often in the form of software as a ...
How to strengthen your executive protection program to address and mitigate the impacts of stalking aimed at executives A customer becomes obsessed with an executive due to their relatable social media presence and desperately wants their ...
Authors/Presenters: Panel
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...
Explore the top 15 cloud compliance tools in 2025 that you can leverage to protect your organization and customer data.
The post Top 15 Cloud Compliance Tools in 2025 appeared first on Scytale.
The post Top 15 Cloud Compliance Tools in 2025 ...
Cycode unveiled Change Impact Analysis (CIA) technology, a key addition to its Complete ASPM platform. This solution empowers organizations to proactively assess the security impact of every code change, enabling them to identify, prioritize, and ...
Ontinue announced the expansion of its managed services to include IoT/OT environments. Ontinue ION for IoT Security is an add-on service to the Ontinue ION MXDR service that extends continuous protection to customers’ IoT and OT ...
AMD has released patches for a microprocessor vulnerability that could allow an attacker to load malicious microcode.
The post AMD Patches CPU Vulnerability Found by Google appeared first on SecurityWeek.
CVE-2025-0411, a Mark-of-the-Web bypass vulnerability in the open-source archiver tool 7-Zip that was fixed in November 2024, has been exploited in zero-day attacks to deliver malware to Ukrainian entities, Trend Micro researchers have revealed. ...
Austin, TX, USA, 4th February 2025, CyberNewsWire
The post SpyCloud Pioneers the Shift to Holistic Identity Threat Protection appeared first on Security Boulevard.
In an era marked by high-profile cyber breaches, ransomware attacks, and violence committed against high-profile enterprise employees, the imperative for focused cybersecurity training for executives has escalated dramatically. For CISOs and ...
Malicious employees and insider threats pose one of the biggest security risks to organizations, as these users have more access and permissions than cybercriminals attacking the organization externally.
The post How to Root Out Malicious ...
Food delivery firm GrubHub has disclosed a data breach impacting the personal information of drivers and customers.
The post Personal Information Compromised in GrubHub Data Breach appeared first on SecurityWeek.
Nymi launched next-generation wearable authenticator, the Nymi Band 4, which introduces design upgrades and expanded passwordless use cases for regulated industries, while retaining its core authentication functionality. This latest development ...
There has never been a single job description for the CISO – the role depends upon each company, its maturity, its size and resources, and the risk tolerance of boards.
The post Cyber Insights 2025: The CISO Outlook appeared first on SecurityWeek.