Application Security News and Articles


DEF CON 32 – AppSec Village – Lessons Learned from Building and Defending LLM Applications

Authors/Presenters:Javan Rasokat Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

USENIX NSDI ’24 – Harvesting Idle Memory for Application-managed Soft State with Midas

Authors/Presenters:Yifan Qiao, Zhenyuan Ruan, Haoran Ma, Adam Belay, Miryung Kim, Harry Xu Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and ...

Modernizing Data Security: Imperva and IBM zSystems in Action

As data security continues to evolve, businesses require solutions that scale to modern environments. Imperva and IBM zSystems have partnered to deliver a comprehensive approach to securing data within IBM z/OS environments while supporting the ...

USENIX NSDI ’24 – SIEVE is Simpler than LRU: An Efficient Turn-Key Eviction Algorithm for Web Caches

Community Award Winner! Authors/Presenters:Yazhuo Zhang, Juncheng Yang, Yao Yue, Ymir Vigfusson, K.V. Rashmi Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems ...

Non-Human Identity in the AI Age: A Technical Deep Dive

As artificial intelligence evolves, the concept of "identity" extends beyond humans. This article delves into the technical intricacies of non-human identity in the AI age, exploring how AI systems are identified, authenticated, and managed in a ...

How Security Automation Platforms Streamline SOC Operations

The post How Security Automation Platforms Streamline SOC Operations appeared first on AI-enhanced Security Automation. The post How Security Automation Platforms Streamline SOC Operations appeared first on Security Boulevard.

USENIX NSDI ’24 – Accelerating Skewed Workloads With Performance Multipliers in the TurboDB Distributed Database

Authors/Presenters:Jennifer Lam, Jeffrey Helt, Wyatt Lloyd, Haonan Lu Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) ...

DEF CON 32 – AppSec Village – Lessons Learned from Building and Defending LLM Applications

DEF CON 32 - Lessons Learned from Building and Defending LLM Applications Authors/Presenters:Javan Rasokat Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from ...

Is an AI-augmented SOC The Way Forward?

Even with the growing focus on innovation, fear, uncertainty, and doubt (FUD) continue to influence how some perceive AI advancements in cybersecurity. Often, the narrative focuses on how AI enables nefarious actors—think automated phishing ...

Elevating SaaS Security: The Strategic Role of Bug Bounty Programs

For engineers and security professionals working within SaaS environments, the standard suite of security tools—firewalls, IDS/IPS, SIEMs, WAFs, endpoint protection and secure development practices—forms the backbone of any security ...

USENIX NSDI ’24 – THC: Accelerating Distributed Deep Learning Using Tensor Homomorphic Compression

Authors/Presenters:Minghao Li, Ran Ben Basat, Shay Vargaftik, ChonLam Lao, Kevin Xu, Michael Mitzenmacher, Minlan Yu Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked ...

Randall Munroe’s XKCD ‘Temperature Scales’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Temperature Scales’ appeared first on Security Boulevard.

INE Security Launches New Training Solutions to Enhance Cyber Hygiene for SMBs

Cary, NC, 22nd October 2024, CyberNewsWire The post INE Security Launches New Training Solutions to Enhance Cyber Hygiene for SMBs appeared first on Security Boulevard.

The Power of Taint Analysis: Uncovering Critical Code Vulnerability in OpenAPI Generator

This blog post explains how taint analysis tracks all data flows in an application’s source code to unveil deeply hidden vulnerabilities and showcases a critical vulnerability in the OpenAPI Generator discovered by SonarCloud. The post The ...

USENIX NSDI ’24 – Approximate Caching for Efficiently Serving Text-to-Image Diffusion Models

Authors/Presenters:Shubham Agarwal, Subrata Mitra, Sarthak Chakraborty, Srikrishna Karanam, Koyel Mukherjee, Shiv Kumar Saini Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on ...

DEF CON 32 – AppSec Village – Your CI CD Pipeline Is Vulnerable, But It’s Not Your Fault

Authors/Presenters:Elad Pticha, Oreen Livni Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention ...

Best Cybersecurity Metrics to Use in the Boardroom | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Best Cybersecurity Metrics to Use in the Boardroom | Kovrr appeared first on Security Boulevard.

Cranium Detect AI accelerates AI governance

Cranium launched Detect AI, an AI discovery tool at scale. With this launch, Cranium is extending its platform capabilities to include visibility and access across an organization’s AI instances, which enables security and compliance teams ...

MixMode Recognized By USA Today As One Of The Top 10 AI Companies To Watch in 2024

MixMode has been recognized by USA Today as one of the Top 10 AI Companies to Watch in 2024. This prestigious acknowledgment highlights MixMode’s vital contributions to cybersecurity and ability to shape the industry's future through advanced ...

SailPoint Machine Identity Security reduces the risk associated with unmanaged machine identities

SailPoint launched SailPoint Machine Identity Security, a new Identity Security Cloud product. SailPoint Machine Identity Security is a dedicated product built specifically for machine accounts such as service accounts and bots. Built on ...