Application Security News and Articles


Shaping effective AI governance is about balancing innovation with humanity

In this Help Net Security interview, Ben de Bont, CISO at ServiceNow, discusses AI governance, focusing on how to foster innovation while ensuring responsible oversight. He emphasizes the need for collaboration between technologists, ...

Exposed APIs and issues in the world’s largest organizations

In this Help Net Security video, Tristan Kalos, CEO of Escape, discusses the results of its 2024 State of API Exposure report. The study highlights significant API security gaps affecting Fortune 1000 organizations, with over 28,500 exposed APIs ...

Keycloak: Open-source identity and access management

Keycloak is an open-source project for identity and access management (IAM). It provides user federation, strong authentication, user management, authorization, and more. Keycloak is based on standard protocols and supports OpenID Connect, OAuth ...

How to Choose the Right Test Data Management Tools

In today’s fast-paced, compliance-focused world, choosing the right test data management (TDM) tools is vital for development and QA teams. These tools go beyond simple data masking—they manage, secure, and optimize test data across multiple ...

AI: Overhyped or Essential for the Workforce?

The post AI: Overhyped or Essential for the Workforce? appeared first on AI-Enhanced Security Automation. The post AI: Overhyped or Essential for the Workforce? appeared first on Security Boulevard.

Getting Better: Evolving Practices in API Security

Are we Really Securing our Machine Identities? In today’s dynamic world, where businesses increasingly rely on a multitude of applications that drive their operations, API security plays a pivotal role. However, as organizations speed towards ...

Building Confidence with Strategic Secrets Management

Can Strategic Secrets Management Boost Your Confidence? In today’s unpredictable cybersecurity landscape, building confidence in your protections may appear like a challenging endeavour. Yet, the key rests in a proactive and comprehensive ...

Safe Handling of Data: Why Secrets Sprawl is a Risk

Why is Secrets Sprawl a Risk in Data Handling? As cybersecurity continues to evolve at an unprecedented pace, businesses are increasingly becoming aware of the need to secure their digital assets, including data and secrets. Among these, ...

Top November Attacks | Contrast ADR Attack Data | Contrast Security

Attackers targeted applications and application programming interfaces (APIs) with an average of 50 confirmed attacks per app in the month of November 2024. That’s down from the previous month, but an alarming number of attacks continue to ...

DEF CON 32 – Digital Emblems-When Markings Are Required, But You Have No Rattle-Can

Authors/Presenters: Bill Woodcock Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Websites and HIPAA: Navigating Online Tracking Technologies

Today, healthcare providers, insurers, and other HIPAA-covered entities are increasingly relying on websites to share information, engage with patients, and streamline operations. While websites offer numerous benefits, it’s crucial to ...

How Should OT Companies Measure Cyber Risk? | ARIA Cybersecurity

The ARIA Cybersecurity team had a hugely productive week in Anaheim, California at the recent 2024 Rockwell Automation Fair. The event was a fantastic opportunity to make connections with companies from across different industries. They all ...

Randall Munroe’s XKCD ‘Seismologists’

Permalink The post Randall Munroe’s XKCD ‘Seismologists’ appeared first on Security Boulevard.

Flare Raises $30M Series B Led by Base 10 Partners to Continue Growth in Security Intelligence and Threat Exposure Management Markets

Today, we at Flare announced our USD $30M Series B Round led by Base10 Partners with participation from Inovia Capital, White Star Capital, and Fonds de solidarité FTQ.  We have raised CAD $9.5M to this point, and plan for this fresh round of ...

Is crypto safe? What to know before investing in digital currencies

The digital currency market is booming, and as security professionals, we must address the crucial question: Is crypto safe?  Following the re-election of former President Donald The post Is crypto safe? What to know before investing in digital ...

The Growing Threat of E-Skimming: Why March 2025’s PCI Deadline Matters

by Source Defense The landscape of payment security is at a critical turning point. As we approach the March 31, 2025 PCI compliance deadline for implementing new e-skimming controls, organizations face mounting pressure to address what has ...

Resecurity introduces Government Security Operations Center (GSOC) at NATO Edge 2024

Los Angeles, USA, 11th December 2024, CyberNewsWire The post Resecurity introduces Government Security Operations Center (GSOC) at NATO Edge 2024 appeared first on Security Boulevard.

News alert: DMD Diamond invites developers to participate in open beta for its v4 blockchain

Vienna, Austria, Dec. 11, 2024, CyberNewswire — DMD Diamond, one of the oldest blockchain projects in the space, has announced the start of Open Beta for the DMD Diamond v4 blockchain. Established in 2013, DMD Diamond is recognized as … ...

Oasis Security Details MFA Security Flaw Found in Microsoft Cloud Services

Oasis Security today revealed that it worked with Microsoft to fix a flaw in its implementation of multi-factor authentication (MFA) that could have been used by cybercriminals to gain access to every major Microsoft cloud service The post Oasis ...