Application Security News and Articles
Authors/Presenters:Jen Ozmen, Aaron Shim
Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention ...
As businesses navigate an increasingly digital landscape, leveraging advanced technologies has become essential. At GITEX 2024, Seceon proudly showcased its commitment to empowering organizations with AI-driven cybersecurity solutions, with our ...
Artificial intelligence (AI) is transforming the fortunes of companies across the planet. But retailers are in a particularly advantageous position, given the large volume of data they manage—on everything from stock levels to customer ...
We’re just weeks away from November 12, 2024—the date when Google Chrome will begin distrusting newly issued certificates from Entrust Roots. Shortly after, Mozilla will implement its distrust in Entrust Roots by the end of November. If your ...
Our daily lives depend on critical infrastructure – water treatment facilities, power grids, transportation systems. Unfortunately, these systems are increasingly becoming targets for cyberattacks.
The post The Rise of Cyberattacks on Critical ...
Reading Time: 2 min Read the inspiring story of how UK-based MSP CloudTech24 automated and simplified domain security management for multiple client domains with PowerDMARC.
The post DMARC MSP Case Study: CloudTech24 Simplies Domain Security ...
Since 2022, the FBI and other agencies have been sounding the alarm about North Koreans posing as US or other non-North Korean based IT workers and infiltrating companies. In July, security firm KnowBe4 publicly revealed that they unknowingly ...
A recent alert jointly issued by a myriad of governmental agencies including CISA, FBI, EPA, DOE, NSA and NCSC-UK has spotlighted activities by Russians targeting U.S. and European critical infrastructure.
The post Strengthening Critical ...
The SEC fined Unisys, Avaya, Check Point, and Mimecast millions of dollars for disclosures in the wake of the high-profile SolarWinds data breach that intentionally mislead investors and downplayed the impact the supply chain attack had on ...
The overwhelming majority of teachers, parents, and students believe in the efficacy of classroom technology. The education technology sector, or EdTech, is currently valued at $142.37 billion. Its buy-in from these groups, plus that of ...
By continuously learning from new data, ML models can adapt to evolving threat landscapes, making them invaluable in identifying zero-day vulnerabilities before they can be exploited.
The post Exploring the Transformative Potential of AI in ...
What is an Internal Audit? An internal audit is an independent, objective evaluation of your organization’s performance. It ensures that your processes and controls are functioning as they should and helps identify areas for improvement. ...
Unmanaged software as a service (SaaS) applications and AI tools within organizations are posing a growing security risk as vulnerabilities increase, according to a report from Grip Security.
The post Majority of SaaS Applications, AI Tools ...
Fortinet has finally made public information about CVE-2024-47575, a critical FortiManager vulnerability that attackers have exploited as a zero-day. About CVE-2024-47575 CVE-2024-47575 is a vulnerability stemming from missing authentication for ...
Nucleus Security announced Nucleus POAM Process Automation, a comprehensive solution for federal agencies and their vendors to streamline risk management and automate their Plan of Action and Milestones (POA&M) process. This solution ...
Security leaders must leverage the best of both to truly protect an organization in today's complex digital environment — blending the old with the new.
The post Blending Traditional and Emerging Cybersecurity Practices for a Holistic Approach ...
F5 announced BIG-IP Next for Kubernetes, an AI application delivery and security solution that equips service providers and large enterprises with a centralized control point to accelerate, secure, and streamline data traffic that flows into and ...
When building a cybersecurity team, you likely asked yourself, “Should I focus on certifications or real-world skills?” And since you rarely encounter entry-level candidates who can hit the ground running, naturally, you’d consider a ...
In this Help Net Security interview, John Cohen, Executive Director, Program for Countering Hybrid Threats at the Center for Internet Security, discusses the four pillars of the National Framework for Action, emphasizing how these measures can ...
Cyber insurance is vital for companies mitigating cyber risks, but the industry still encounters significant challenges, including shifting policy requirements and uncertainty around coverage in the event of an incident. As cyberattacks continue ...