Application Security News and Articles


IBM Addresses AI, Quantum Security Risks with New Platform

IBM is rolling out Guardian Data Security Center, a framework designed to give enterprises the tools they need to address the emerging cyberthreats that come the ongoing development of generative AI and quantum computing. The post IBM Addresses ...

Keep your secrets secret: 5 core tips — and a call to action on modernizing

Many organizations have experienced significant data breaches after inadvertently exposing secrets such as tokens, API keys, digital certificates, and user credentials that attackers gained access to. Many factors have made it harder to avoid ...

10 Network Segmentation Best Practices

The security of your network is critical, and segmenting it is one of the most effective strategies to enhance your posture. This technique reduces your attack surface and improves overall... The post 10 Network Segmentation Best Practices ...

Bolstering CTEM with AI and Purple Team Security

Together, AI and purple security offer ideal actionable input and ongoing orientation for a CTEM framework. The post Bolstering CTEM with AI and Purple Team Security appeared first on Security Boulevard.

ESET HOME Security enhancements strengthen protection against AI-driven threats

ESET announced its upgraded consumer offering, ESET HOME Security, with new features, such as ESET Folder Guard and Multithread Scanning. These enhancements to ESET HOME Security, as an all-in-one solution for consumers, correspond to the ...

AI is Revolutionizing Cybersecurity — But Not in the Ways You Might Think  

The cybersecurity revolution that began with increased network visibility has culminated in the rise of AI, which can automatically make sense of information that even the best-staffed IT departments never could. The post AI is Revolutionizing ...

java security practices

java security practicesContinue reading on Medium »

Cohesity Gaia brings the power of generative AI to enterprise data

Cohesity introduced a patent-pending visual data exploration capability to Cohesity Gaia, its AI-powered search assistant launched earlier this year. By providing customers with a visual categorization of the themes across documents and files ...

Election Security: Here’s What We Should Really Be Worried About

Rather than buying into unfounded claims of how fragile our election technology is, perhaps we should recognize its proven strengths and focus on improving from there. The post Election Security: Here’s What We Should Really Be Worried About ...

Reality Defender secures $33 million to enhance AI detection capabilities

Reality Defender announced that its Series A fundraising has been expanded, securing a total of $33 million in capital investment. The expanded fundraising round was led by Illuminate Financial, with additional participation from Booz Allen ...

Who Owns SaaS Identity Risk Management, Anyway? | Grip

This article explores where SaaS identity risk management fits in an organization and what's needed to modernize SaaS security with clear governance. The post Who Owns SaaS Identity Risk Management, Anyway? | Grip appeared first on Security ...

Stream.Security raises $30 million to boost cloud security

Stream.Security closed a $30 million Series B funding round led by U.S. Venture Partners, with participation from new investors, Citi Ventures, and existing investors, Energy Impact Partners (EIP), Cervin Ventures, TLV Partners, and Glilot ...

Scytale Supports the CIS Controls Framework

Scytale now supports the CIS Controls Framework, allowing businesses to streamline their security and compliance processes. The post Scytale Supports the CIS Controls Framework appeared first on Scytale. The post Scytale Supports the CIS Controls ...

Effective strategies for measuring and testing cyber resilience

In this Help Net Security interview, Detective Superintendent Ian Kirby, CEO of the National Cyber Resilience Centre Group (NCRCG), discusses the emerging cyber threats and strategies organizations can use to increase cyber resilience. He ...

Cofense announces Client-Specific Privacy-Assured AI Spam Filtering

New advancements to the Cofense Phishing Detection and Response (PDR) platform improve visibility of dangerous email-based threats helping SOC teams respond faster. The post Cofense announces Client-Specific Privacy-Assured AI Spam Filtering ...

Argus: Open-source information gathering toolkit

Argus is an open-source toolkit that simplifies information gathering and reconnaissance. It features a user-friendly interface and a collection of powerful modules, enabling the exploration of networks, web applications, and security ...

Evolving cloud threats: Insights and recommendations

Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by leveraging adversary-in-the-middle (AITM) attacks to bypass multi-factor ...

Cybersecurity jobs available right now: October 23, 2024

Cybersecurity Engineer Texas Instruments | USA | On-site – View job details As a Cybersecurity Engineer, you will design, implement and maintain cybersecurity controls for security tools to help drive zero trust and secure by ...

Showcasing our Industry-First BDR Solution in Singapore

SquareX @ Cyber Security World Asia + GovWare 2024 October 2024 marked an exciting time for SquareX as we returned to our home ground, Singapore, for two significant back-to-back events: Cyber Security World Asia (part of Singapore Tech Week) ...

Most women in IT work overtime to advance in their careers

As a historically male-dominated industry, many IT companies have been described as having limited career development opportunities for female employees, according to Acronis. Issues like lack of mentorship, inadequate policies for work-life ...