Application Security News and Articles


SOC 2 Compliance Requirements and Criteria

Meeting SOC 2 standards demonstrates your commitment to security and boosts trust—especially when you have a report to prove it. The American Institute of Certified Public Accountants (AICPA) created these standards and the coordinating ...

Security Assessment Reports: A Complete Overview

The first step to improving your security posture is knowing where you stand. That’s what a security assessment report (SAR) tells you. The post Security Assessment Reports: A Complete Overview appeared first on Security Boulevard.

Kusari helps organizations gain visibility into their software

By ingesting Software Bill of Materials (SBOM) data – a list of all software components – the Kusari platform presents a timeline of the software to identify where impacts are likely to surface. In creating a single source of truth, Kusari is ...

Russian Disinformation Group Behind Bogus Walz Conspiracy: Report

The Russian disinformation group Storm-1516 reportedly was behind a deepfake video that claimed so show a former student accusing vice presidential candidate Tim Walz of abusing him, the latest incident in a U.S. election season targeted for ...

ShadyShader: Crashing Apple M-Series Devices with a Single Click

Introduction A while ago, we discovered an interesting vulnerability in Apple’s M-series chips that allowed us to freeze and crash Apple devices by exploiting a flaw in the GPU’s driver. This vulnerability, which we’ve dubbed ShadyShader, ...

SailPoint Adds Raft of Capabilities to Better Manage Privileges

SailPoint Technologies today added a bevy of capabilities that makes it possible for organizations to manage identities on a more granular level. Announced at the SailPoint Navigate 2024 conference, the company is also previewing a set of ...

Putting the “R” back in GRC – Insights from Gartner on Emerging Cyber GRC Technologies

Cyber GRC (Governance, Risk, and Compliance) tools are software solutions that help organizations manage and streamline their cybersecurity, risk management, and compliance processes. These tools integrate the three core components—governance, ...

IBM Guardium Data Security Center protects hybrid cloud and AI

As hybrid cloud-, AI-, and quantum-related risks upend the traditional data security paradigm, IBM is launching IBM Guardium Data Security Center – allowing organizations to protect data in any environment, throughout its full lifecycle, and ...

Packet Capture cStor 200S enables organizations to capture, analyze, and optimize network traffic

cPacket Networks launched Packet Capture cStor 200S, the latest addition to its Packet Capture and analytics portfolio. Engineered to meet the escalating demands of enterprise data centers, high-frequency trading platforms, and mission-critical ...

VMware fixes critical vCenter Server RCE bug – again! (CVE-2024-38812)

Broadcom has released new patches for previously fixed vulnerabilities (CVE-2024-38812, CVE-2024-38813) in vCenter Server, one of which hasn’t been fully addressed the first time and could allow attackers to achieve remote code execution. ...

Palo Alto Networks extends security into harsh industrial environments

The convergence of IT and operational technology (OT) and the digital transformation of OT have created new opportunities for innovation and efficiency in critical Industrial Automation and Control Systems. However, these advancements also ...

Roundcube XSS flaw exploited to steal credentials, email (CVE-2024-37383)

Attackers have exploited an XSS vulnerability (CVE-2024-37383) in the Roundcube Webmail client to target a governmental organization of a CIS country, Positive Technologies (PT) analysts have discovered. The vulnerability was patched in May 2024, ...

Ivanti Neurons for App Control strengthens endpoint security

Ivanti introduced Ivanti Neurons for App Control, which safeguards devices from unauthorized applications. In addition, Ivanti released new analytics in the Ivanti Neurons platform and new features for Ivanti Neurons for Patch Management to ...

Fastly DDoS Protection blocks malicious traffic

Fastly released Fastly DDoS Protection to provide automatic protection from Layer 7 and other application-level DDoS attacks. With a click of a button, organizations can enable Fastly DDoS Protection to automatically shield their applications and ...

Proofpoint Alternatives and Competitors: Find the Best

Reading Time: 6 min Discover the best Proofpoint alternatives for email protection. Compare leading competitors to find the right solution for your business's cybersecurity needs. The post Proofpoint Alternatives and Competitors: Find the Best ...

OWASP Mobile Top 10 2024: Update Overview

75% of Mobile Apps Fail Basic Security Tests. Hackers are increasingly focusing on the mobile channel, making mobile apps a prime target for fraud and security breaches. With this growing threat, it’s essential for organizations and app ...

Identity Revolution: Welcome to the Dynamic World of IAM 360

Identity Revolution: Welcome to the Dynamic World of IAM 360 madhav Tue, 10/22/2024 - 05:02 It’s been quite the journey, but here it is—the first issue of IAM 360! For too long, Identity and Access Management (IAM) has played a background ...

IT security and government services: Balancing transparency and security

Government information technology leaders find themselves at a challenging balance point: On one end of the scale are increasing threats from cyber actors, bolstered by advanced technology like artificial intelligence (AI); on the other end is a ...

Phishing scams and malicious domains take center stage as the US election approaches

Phishing scams aimed at voters, malicious domain registrations impersonating candidates, and other threat activity designed to exploit unassuming victims take center stage as the US election approaches, according to Fortinet. “As the 2024 US ...

Myths holding women back from cybersecurity careers

In this Help Net Security interview, Dr Kathryn Jones, Head of School, Computer Science and Informatics at Cardiff University, discusses the challenges and misconceptions that deter women from pursuing careers in cybersecurity. Dr Jones also ...