Application Security News and Articles


Wipro and Secret Double Octopus provide enterprises with stronger authentication mechanisms

Secret Double Octopus partners with Wipro to strengthen passwordless protection against identity-based cyber attacks. Under the new partnership, Wipro’s Cybersecurity and Risk Services (CRS) will use SDO’s Octopus Enterprise technology ...

CISO’s Guide to the ROI of Cybersecurity

Learn how to articulate the value of your cybersecurity strategy while mitigating bad bots  The job of a Chief Information Security Officer (CISO) sometimes feels like a zero-sum game. From ensuring the health and security of an enterprise’s ...

Mastercard acquires Baffin Bay Networks to improve customer security

Mastercard acquired Baffin Bay Networks to better help businesses deal with the increasingly challenging nature of cyber-attacks. Baffin Bay Networks, based in Sweden, adds to Mastercard’s multi-layered approach to cyber security and helps to ...

Aembit Scores $16.6M Seed Funding for Workload IAM Technology

Maryland startup Aembit gets funding to build an identity platform designed to manage, enforce, and audit access between federated workloads. The post Aembit Scores $16.6M Seed Funding for Workload IAM Technology appeared first on SecurityWeek.

USENIX Security ’22 – Agnieszka Dutkowska-Zuk, Austin Hounsel, Amy Morrill, Andre Xiong, Marshini Chetty, Nick Feamster – ‘How and Why People Use Virtual Private Networks’

Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Security ’22 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX Security ’22 – Agnieszka Dutkowska-Zuk, Austin ...

Software supply chain security practices are maturing — but it’s a work in progress

Many software supply chain security practices have been widely adopted, but there is still a lot of room for improvement, according to a recent OpenSSF survey of 167 software professionals. The post Software supply chain security practices are ...

Automate your DevSecOps to take the pressure off triage

Tools like Code Dx that support automation are the answer to faster software development delivery cadence. The post Automate your DevSecOps to take the pressure off triage appeared first on Security Boulevard.

Investing in People Doesn’t Take AI

Investing in People Doesn’t Take AI AI is not an investment; ask any bank. Decisions made by people powered by artificial intelligence should keep the accountability and responsibility of the organization the same. Now that ChatGPT-XYZ has ...

Women’s History Month at RiskLens: More Voices

For Women’s History Month, we are asking RiskLens staff members for their thoughts on the current status and outlook for women in the cybersecurity field and technology generally. The post Women’s History Month at RiskLens: More Voices ...

[New Live Series] Dev Chat with Dan Conn: Beware of Malware

  The post [New Live Series] Dev Chat with Dan Conn: Beware of Malware appeared first on Security Boulevard.

Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 422’

via the respected security expertise of Robert M. Lee and the superlative illustration talents of Jeff Haas at Little Bobby Comic Permalink The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 422’ ...

A Former FBI Agent’s Thoughts: National Cybersecurity Strategy

The government just released its new National Cybersecurity Strategy built around five pillars: Pillar One: Defend Critical Infrastructure Pillar Two: Disrupt and Dismantle Threat Actors Pillar Three: Shape Market Forces to Drive Security ...

How to Ensure Your Development Complies With SOC 2

Discover what you need to know from a development point of view for SOC 2 compliance. The post How to Ensure Your Development Complies With SOC 2 appeared first on Scytale. The post How to Ensure Your Development Complies With SOC 2 appeared ...

The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors Work

Flashpoint assesses that ChatGPT will lower the barrier to entry for basic hacking tasks, such as scanning open ports, crafting phishing emails, and deploying virtual machines for low-sophisticated threat actors. The post The AI Risk Landscape: ...

USENIX Security ’22 – ‘Security At The End Of The Tunnel: The Anatomy Of VPN Mental Models Among Experts And Non-Experts In A Corporate Context’

Complete Title: 'USENIX Security '22 - Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets - ‘Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a ...

Industry 4.0 vs. Smart Factory: What Will the Future Look Like?

It isn’t easy to imagine the process that brings all our things into being. Just think about the journey your computer made from parts in a The post Industry 4.0 vs. Smart Factory: What Will the Future Look Like? appeared first on ...

How Hackers are Exploiting Cloud Organizations | Eureka Security

Protect your organization from data breaches in the cloud. Learn how hackers are accessing sensitive data and growing in their sophistication. | Eureka Security The post How Hackers are Exploiting Cloud Organizations | Eureka Security ...

Why You Should Opt Out of Sharing Data With Your Mobile Provider

A new breach involving data from nine million AT&T customers is a fresh reminder that your mobile provider likely collects and shares a great deal of information about where you go and what you do with your mobile device -- unless and until ...

Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes

Cryptocurrency ATM maker General Bytes discloses a security incident resulting in the theft of millions of dollars’ worth of crypto-coins. The post Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes appeared first on ...

Waterfall Security, TXOne Networks Launch New OT Security Appliances

Waterfall Security Solutions and TXOne Networks have each announced launching new OT security appliances. The post Waterfall Security, TXOne Networks Launch New OT Security Appliances appeared first on SecurityWeek.