Application Security News and Articles


Cyber Agility Mandate – Transforming InfoSec Programs to Meet Evolving Markets

Five steps to take that will allow the infosec team to reduce the risk of trailing the latest transformation changes. The post Cyber Agility Mandate – Transforming InfoSec Programs to Meet Evolving Markets appeared first on Security Boulevard.

N2WS platform enhancements improve restore time for enterprises and MSPs

N2WS has unveiled new enhancements to its cloud-native backup and disaster recovery (BDR) platform. These updates empower enterprises and managed service providers (MSPs) to address the growing threats of ransomware and other malicious attacks ...

The Decentralized SaaS Adoption Trend: Why This Poses a Risk to Organizations and Identities

When departments independently adopt SaaS applications, the security team often loses visibility and control, making these environments highly vulnerable to attacks. The post The Decentralized SaaS Adoption Trend: Why This Poses a Risk to ...

Sweet Security helps organizations protect their cloud environments

Sweet Security introduces unified Cloud Native Detection and Response platform, designed to transform the way organizations protect their cloud environments in real time. Sweet’s platform integrates the capabilities of Application Detection and ...

Phishers send corrupted documents to bypass email security

Phishers have come up with a new trick for bypassing email security systems: corrupted MS Office documents. The spam campaign Malware hunting service Any.Run has warned last week about email campaigns luring users with promises of payments, ...

Push Security introduces verified stolen credentials detection capability

Push Security unveiled verified stolen credentials detection capability, a new feature designed to reshape how security teams combat identity threats. By analyzing threat intelligence (TI) on stolen credentials and comparing it against active ...

US government, energy sector contractor hit by ransomware

ENGlobal, a Texas-based engineering and automation contractor for companies in the energy sector, has had its data encrypted by attackers. “On November 25, 2024, ENGlobal Corporation (the “Company”) became aware of a cybersecurity ...

Nextcloud Talk: Open-source, GDPR-compliant alternative to Microsoft Teams

Nextcloud has unveiled Nextcloud Talk, an open-source alternative to Microsoft Teams. It’s a privacy-compliant collaboration platform for hybrid teams that gives companies complete control over their data. Nextcloud Talk collaboration ...

Thales Data Risk Intelligence identifies risks to sensitive data

Thales launched Data Risk Intelligence, an Imperva Data Security Fabric (DSF) solution that proactively addresses the risks to data wherever it resides. This is the first solution uniting the risk and threat identification capabilities of the ...

Treat AI like a human: Redefining cybersecurity

In this Help Net Security interview, Doug Kersten, CISO of Appfire, explains how treating AI like a human can change the way cybersecurity professionals use AI tools. He discusses how this shift encourages a more collaborative approach while ...

Best practices for staying cyber secure during the holidays

In this Help Net Security video, Sean Tufts, managing partner for critical infrastructure and operational technology at Optiv, discusses best practices for keeping businesses secure amidst a barrage of threats during the holiday season. Pause ...

Cybersecurity jobs available right now: December 3, 2024

Application Security Engineer TE Connectivity | USA | Remote – View job details As an Application Security Engineer, you will design, develop, and implement a robust Application Security program. Create and maintain application ...

Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform

Tel Aviv, ISRAEL, 2nd December 2024, CyberNewsWire The post Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform appeared first on Security Boulevard.

The shocking speed of AWS key exploitation

It’s no secret that developers often inadvertently expose AWS access keys online and we know that these keys are being scraped and misused by attackers before organizations get a chance to revoke them. Clutch Security researchers performed ...

Exploring the Highest Paying Cybersecurity Jobs in 2024

The typical salary ranges for various cybersecurity roles and the elements and factors that impact earning potential in the cybersecurity field. The post Exploring the Highest Paying Cybersecurity Jobs in 2024 appeared first on Security Boulevard.

Reposition Cybersecurity From a Cost Center to a Business Driver

Repositioning cybersecurity as a business issue ensures that it receives the attention and resources it requires at the highest levels of the organization. The post Reposition Cybersecurity From a Cost Center to a Business Driver appeared first ...

Signs Point to Foreign Syndicate Fueling BEC Surge From Within U.S. ISPs

By staying informed of these evolving tactics and adopting advanced detection tools, organizations can better protect themselves against the increasingly stealthy and persistent BEC threats affecting businesses worldwide. The post Signs Point to ...

Datadog Cloud SIEM accelerates security investigations

Datadog announced its modern approach to Cloud SIEM, which doesn’t require dedicated staff or specialized teams to activate the solution. This approach makes it easy for teams to onboard, de-risk migrations and democratize security ...

Skyflow protects sensitive data flowing in and out of AI agents

Skyflow unveiled new capabilities for Agentic AI. These allow enterprises to build and deploy AI agents with a security and privacy trust layer with features that include protecting sensitive data flowing in and out of AI agents, auditing & ...

Radiant Logic provides continuous identity hygiene assessments via real-time streaming data

Radiant Logic announces the expansion of its central intelligence hub solution, RadiantOne, to now include Identity Observability. Building on the identity security foundation of Identity Data Management and Identity Analytics, Identity ...