Application Security News and Articles


Liquidmatrix Security Digest Podcast – Episode 7D

Episode 0x7D It’s just a dream… There’s a lot going on as we head into summer here in the northern hemisphere. I think it’s pretty cool but also worry a little bit that we’re staying too focused on the wrong things. You ever have the ...

Deep Sea Phishing Pt. 1

PHISHING SCHOOL How to Bypass EDR With Custom Payloads If endpoint detection and response (EDR) protections keep blocking your phishing payloads, you really should learn how to write custom payloads. If you’ve never written a custom payload, ...

Empower Your Developers with Software Supply Chain Security

Gartner names OX Security as representative vendor in Emerging Tech Impact Radar: DevOps report The historical friction between software developers and cybersecurity teams is a thing of legend. Developers are traditionally focused on building new ...

Randall Munroe’s XKCD ‘CrowdStrike’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘CrowdStrike’ appeared first on Security Boulevard.

Learn Modern SOC and D&R Practices Using Autonomic Security Operations (ASO) Principles

Learn Modern SOC and D&R practices for free from Google! Yes, really! That’s the message. Join *hundreds* of others who already signed up! Now, with full details…. After some ungodly amount of work, the original ASO crew (but really ...

EFF Angry as Google Keeps 3rd-Party Cookies in Chrome

Regulatory capture by stealth? Google changes its mind about third-party tracking cookies—we’re stuck with them for the foreseeable. The post EFF Angry as Google Keeps 3rd-Party Cookies in Chrome appeared first on Security Boulevard.

H1 SCA Roundup – Defending Users Against Constantly Evolving Cyber Threats

Learn more about GitGuardian SCA commitment and fast adaptation strategies to safeguard the software supply chain of its users. The post H1 SCA Roundup – Defending Users Against Constantly Evolving Cyber Threats appeared first on Security ...

The Evolution of WAF and RASP | Impart Security

Rami McCarthy did a great post last month touching on some of the history of RASP.  I thought the post was great and did a great job focusing on the competitive landscape, industry factors, and technical barriers to entry.  In this post, I ...

LOKKER introduces web privacy risk summary for insurers

LOKKER released a new privacy solution for insurers: the ability to share on-demand web privacy risk reports with their insureds. These reports give insurers and the insured companies a simple view of their data privacy risk profile in eight ...

Strata Identity Continuity prevents mission-critical applications from going offline

Strata Identity announced Identity Continuity, an addition to its Maverics Identity Orchestration platform. This new premium offering ensures business continuity and uninterrupted application access by seamlessly failing over from a primary cloud ...

AppViewX AVX ONE CLM – Managing Java TrustStore with Google Cloud Platform

Google Cloud Storage is a highly scalable, secure, and durable object storage service designed to handle vast amounts of data for a wide range of applications. As part of the Google Cloud Platform, it offers robust infrastructure and seamless ...

Ketch No-Code Rights Automation empowers non-technical teams to manage DSR requests

Ketch launched its No-Code Rights Automation product, designed to make it easy for non-technical teams to comply with consumer requests for data deletion and access. This includes the full business process from receiving the consumer request, to ...

Strata Identity Announces General Availability of Identity Continuity for Zero Application Downtime During IDP Outages

PRESS RELEASE Now available as part of the Maverics Identity Orchestration platform, Strata’s Identity Continuity eliminates business risk with seamless failover from cloud to on-premises IDPs BOULDER, Colo., July 23, 2024 – Strata Identity, ...

SCW Trust Agent measures developers’ security competencies for code commits

Secure Code Warrior introduced SCW Trust Agent – a solution that assesses the specific security competencies of developers for every code commit. This innovative offering enables CISOs and application security (AppSec) teams to embrace a ...

Introducing Identity Continuity™: Uninterrupted access and security in an always-on world

Uninterrupted access to applications and data is critical in the modern business world. When identity providers (IDPs) aren’t available, neither are your applications. The impact can be severe — financial losses, reputational damage, and ...

Four Automated Anti-Phishing Techniques

The post Four Automated Anti-Phishing Techniques appeared first on AI-enhanced Security Automation. The post Four Automated Anti-Phishing Techniques appeared first on Security Boulevard.

Supply Chain Cyberattacks are on the Rise – Here’s How U.S. Businesses can Fortify Their Defenses 

The management of vendor and third-party risks is emerging as the number one challenge among U.S. information security professionals. The post Supply Chain Cyberattacks are on the Rise – Here’s How U.S. Businesses can Fortify Their ...

Wiz Walks Away From $23 Billion Google Bid

Cloud security startup Wiz reportedly is rejecting Google's $23 billion acquisition bid, with the CEO saying the Israeli company will now focus on going public and reach the point of having $1 billion in recurring revenue. The post Wiz Walks Away ...

Social Media and Travel: Be Careful of What You Share

Social media has become an integral part of our daily lives. It allows us to share our experiences, connect with friends and family, and document our travels. However, this convenience comes with a price. The information we share can alert ...

The changes in the cyber threat landscape in the last 12 months

When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. Europol’s recently released Internet Organised Crime Threat ...