Application Security News and Articles


Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #318 — Working for a Big Consultancy

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...

Detection Engineering: A Case Study

In this blog post, we will explore the intricate world of detection engineering. We’ll start by examining the inputs and outputs of detection engineering, and then we’ll illustrate the detection engineering lifecycle. The post Detection ...

Canvas fingerprinting in the wild

Every day, your computer renders dozens of these without you even noticing. Strange patterns, colorful shapes, and emojis—what do you think these are? These are canvas fingerprints, a technique used by the vast majority of websites to ...

5 books I enjoyed in 2024

Have you ever found yourself in a bookstore, overwhelmed by the sheer number of titles and unsure of where to start? Well, let me make it easier for you. Here are five books that I highly recommend, as I found them to be absolutely brilliant. 1. ...

DEF CON 32 – Using AI Computer Vision In Your OSINT Data Analysis

Authors/Presenters: Mike Raggo Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Best of 2024: CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability

In a recent security advisory, Microsoft disclosed a high-severity vulnerability identified as CVE-2024-38063. This critical Remote Code Execution (RCE) flaw, rated with a CVSS score of 9.8, poses a significant... The post CVE-2024-38063: An ...

Cybersecurity Snapshot: What Looms on Cyberland’s Horizon? Here’s What Tenable Experts Predict for 2025

Wondering what cybersecurity trends will have the most impact in 2025? Check out six predictions from Tenable experts about cyber issues that should be on your radar screen in the new year — including AI security, data protection, cloud ...

Choosing the Right Cyber Risk Management Solution: RFI vs. RFP and Beyond

Selecting a cyber risk management solution is a critical decision for any organization. The process requires careful consideration of your needs, how a platform can meet them, and how the solution supports legacy GRC functions. This post will ...

What is the Process of ISO 27001 Certification?

In 2025, the cost of cyberattacks will reach $10.5 trillion globally. The projected growth rate is 15% every year. While the cost of attack keeps increasing, a breach is now identified in 194 days on average. It takes 64 days to contain a breach ...

What is a Software Publisher Certificate and How do You Get One?

Learn what a Software Publisher Certificate is, why it matters for secure software distribution, and how to obtain one step by step.Continue reading on Medium »

The future of data and AI: Seven trends shaping 2025 and beyond

In 2025, seven trends will shape the future of data and AI, offering advantages for those who see these changes not as challenges but as opportunities to innovate and excel. The post The future of data and AI: Seven trends shaping 2025 and beyond ...

Overwhelmed by fraud? Here’s how financial pros fight back

In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the growing threat of deepfake-related fraud and its impact on financial security. He also discusses overlooked vulnerabilities in digital banking ...

Law enforcement agencies see AI as a key tool for reducing crime

A U.S. national survey of first responders reveals strong support for AI adoption, cybersecurity concerns, and increasing demand for cloud-native, data-driven, and interoperable CAD and RMS systems to improve efficiency and public safety ...

Infosec products of the month: December 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, Cato Networks, Datadog, Fortinet, GitGuardian, Horizon3.ai, Netwrix, Radiant Logic, RunSafe Security, SecureAuth, Stairwell, Stamus Networks, ...

Ensuring Safety with Automated Secrets Handling

How Does Automated Secrets Handling Enhance Security? There’s a pressing puzzle to solve in today’s hyper-connected businesses. How do you ensure the safe management of non-human identities (NHIs) and their secrets in a cloud environment? ...

Build Confidence with Advanced Secret Management

Can Advanced Secret Management Accelerate Your Cybersecurity Confidence? As a seasoned data management expert and cybersecurity specialist, I can confirm that Non-Human Identities (NHIs) and Secrets Security Management provide a significant boost ...

Revolutionizing Cloud Security for Future Threats

Why Do We Need a Paradigm Shift in Cloud Security? The surge in cybersecurity incidents globally has left experts asking: Is it time we change our approach to cloud security, considering that breaches are no longer a question of if, but when? The ...

SaaS SIEM: Transforming Cybersecurity with Seceon’s Innovative ApproachSaaS SIEM

As organizations continue to shift toward digital-first operations, the demand for robust cybersecurity solutions has never been greater. Cyber threats are evolving at an unprecedented rate, and businesses must remain agile to protect sensitive ...

Best of 2024: The Best SIEM Tools To Consider in 2024

What is a SIEM? SIEM solutions enable enterprises to monitor and analyze security-related data from a variety of sources, such as firewalls, intrusion detection systems (IDS), and endpoint security devices. By collecting and analysing this data, ...

Achieving CISA BOD 25-01 Compliance and SCuBA Alignment

Learn how to achieve compliance for CISA's BOD 25-01 and SCuBA alignment with AppOmni, updated for M365 SCuBA compliance checks. The post Achieving CISA BOD 25-01 Compliance and SCuBA Alignment appeared first on AppOmni. The post Achieving CISA ...