Application Security News and Articles


Humans are the Beating Heart of the Autonomous SOC

Ultimately, the goal of the autonomous SOC is to create a more efficient and effective security environment where human analysts and AI work together to achieve a higher level of security than either could achieve alone. Working together, each ...

Do You Know What Your Assets Are? 

Asset awareness is the first step in understanding your complete security posture. If you don’t know what assets you own, how can you protect them?  The post Do You Know What Your Assets Are?  appeared first on Security Boulevard.

Change Healthcare Data Breach Impact Grows to 190 Million Individuals

The impact of the Change Healthcare ransomware-caused data breach has increased from 100 million to 190 million individuals. The post Change Healthcare Data Breach Impact Grows to 190 Million Individuals appeared first on SecurityWeek.

Are Third-Party Risk Management Solutions Effective Enough?  

A modern EASM solution offers more by incorporating meaningful first-party and third-party cyber risk insights than conventional TPRM solutions. The post Are Third-Party Risk Management Solutions Effective Enough?   appeared first on Security ...

Data Privacy Day 2025: A Chance to Take Control of Your Data

Data Privacy Day 2025: A Chance to Take Control of Your Data madhav Mon, 01/27/2025 - 09:19 Trust is the cornerstone of every successful relationship between businesses and their customers. On this Data Privacy Day, we reflect on the pivotal ...

DMARC Email Security: A Guide to Protecting Your Domain 

Learn how DMARC email security can protect your brand, improve deliverability, and prevent phishing attacks. Get expert advice and best practices. The post DMARC Email Security: A Guide to Protecting Your Domain  appeared first on Security ...

Industry Moves for the week of January 27, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of January 27, 2025. Stay updated with the latest industry trends and shifts.

AI security posture management will be needed before agentic AI takes hold

As I’m currently knee deep in testing agentic AI in all its forms, as well as new iterations of current generative AI models such as OpenAI’s O1, the complexities of securing AI bot frameworks for enterprise security teams are beginning to ...

Don’t let these open-source cybersecurity tools slip under your radar

This article showcases free, open-source cybersecurity tools that help you identify and address vulnerabilities, detect intrusion, protect websites from cyber attacks, monitor and detect suspicious activities across your network. Am I Isolated: ...

Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed

In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subaru’s Starlink system that allows unrestricted ...

Cyber trends set to influence business strategies

Diligent convened a group of 65 board members, C-suite executives, and leading subject matter experts to explore topics shaping the future of business: generative AI, cybersecurity and data privacy, geopolitical risk, and financial fraud and ...

How to use Apple’s App Privacy Report to monitor data tracking

The App Privacy Report, which Apple introduced in iOS 15.2, allows users to monitor how apps access data and interact with third-party services. The report provides an in-depth analysis of the types of sensitive data accessed by apps, the ...

Innovative Approaches to Secrets Scanning

Is Traditional Cybersecurity Enough in the Age of Automation? Imagine this. You’re in charge of your company’s cybersecurity, and you’ve invested in the best protection money can buy. But a data breach happens, and you’re left wondering ...

Scaling Security with Automated Identity Management

How Crucial is Automated Identity Management in Scaling Security? There’s an ever-increasing need for advanced cybersecurity measures. Organizations, especially those operating in the cloud, can no longer afford to ignore automated identity ...

Empowering Cloud Compliance with Seamless Security

Why are Non-Human Identities (NHIs) Crucial for Seamless Security? Can you imagine a smooth security system that leaves no stone unturned? Non-human identities (NHIs) and secrets management play a significant role in creating an empowered ...

The Small Business Guide to Everyday Access Management and Secure Off-boarding

Learn how to secure your company's digital assets in just 10 minutes a day. This practical guide shows small business owners and startup founders how to manage access, respond to security issues, and handle employee departures efficiently—all ...

DEF CON 32 – Attacks On GenAI Data & Using Vector Encryption To Stop Them

Authors/Presenters: Patrick Walsh, Bob Wall Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

Extending SonarQube to Detect and Flag Insecure AI Model Serialization Formats

Many AI models are serialized and stored in various data formats (a prominent example being pickle), which can introduce significant…Continue reading on Medium »

INE Security Alert: Expediting CMMC 2.0 Compliance

Cary, North Carolina, 26th January 2025, CyberNewsWire The post INE Security Alert: Expediting CMMC 2.0 Compliance appeared first on Security Boulevard.

Week in review: 48k Fortinet firewalls open to attack, attackers “vishing” orgs via Microsoft Teams

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 48,000+ internet-facing Fortinet firewalls still open to attack Despite last week’s confirmation of and warnings about long-standing ...