Application Security News and Articles


Apple Releases Draft Ballot to Shorten Certificate Lifespan to 45 Days

Earlier this week, on October 9, during the second day of the fall CA/Browser Forum Face-to-Face meeting, Apple revealed that it had published a draft ballot for commentary to GitHub. This proposal, which is sponsored by Sectigo, offers to ...

Prevent Path Traversal Attacks with ADR | Contrast Security

The Contrast Security Runtime Security Platform — the engine driving Contrast’s Application Detection and Response (ADR) technology — blocked approximately 55.8K cybersecurity attacks during the month of September 2024.  The post Prevent ...

ADDO session: Secure your application supply chain on AWS

We've wrapped up our 9th All Day DevOps (ADDO) event, where we've learned from the industry's best and brightest about the latest tools and methodologies for securing the software supply chain. Hossam Barakat, Senior Cloud Architect at Amazon Web ...

(In)Fidelity Admits Data Breach 8 Weeks Ago — 77K PII Lost

FMR FAIL: Huge investment firm won’t say how it was hacked. The post (In)Fidelity Admits Data Breach 8 Weeks Ago — 77K PII Lost appeared first on Security Boulevard.

ISO 27001 – 2013 vs 2022: Changes, Transition & More

Information and digital security frameworks like FedRAMP, CMMC, and ISO 27001 are not static documents. They provide a static framework for your business to comply with and achieve, but that framework is only valid for so long. Several different ...

Exploring Goldilocks: ‘Just Right’ Resource Management

Managing resource requests and limits in Kubernetes can be challenging, especially for teams that are new to container orchestration or scaling complex workloads. But without proper configuration, your cluster can become unstable, experience ...

Generative AI Fueling More Sophisticated Cyberattacks: Survey

Organizations say generative AI is fueling a surge of more sophisticated cyberattacks and that they feel unprepared for the onslaught, but a Keeper Security survey found they are investing more in such foundational protections as data encryption ...

Cybersecurity Insights with Contrast CISO David Lindner | 10/11/24

Insight #1: CISOs, you need insurance coverage According to German multinational insurance company Munich Re, the global cyber insurance market is expected to rise from $14 billion to $29 billion by 2027. CISOs will increasingly need to "tell ...

The Ripple Effect: .io Domain Disappearance and Its Impact on the Tech Industry

The .io domain has been a favorite for tech startups, but its potential disappearance is sending ripples through the industry. Discover the reasons behind this change and how it might affect your favorite tech companies and the future of online ...

EU adopts Cyber Resilience Act to secure connected products

The EU Council has adopted the Cyber Resilience Act (CRA), a new law that aims to make consumer products with digital components safe(r) to use. CRA requirements The CRA outlines EU-wide cybersecurity standards for digital products, i.e. products ...

IronNet Has Shut Down

After retiring in 2014 from an uncharacteristically long tenure running the NSA (and US CyberCommand), Keith Alexander founded a cybersecurity company called IronNet. At the time, he claimed that it was based on IP he developed on his own time ...

CornCon X: Powering Cybersecurity Innovation Through Human Connection

At CornCon 2024, experts debunk myths, explore SaaS vulnerabilities, and highlight how human connections shape the future of cybersecurity innovation. The post CornCon X: Powering Cybersecurity Innovation Through Human Connection appeared first ...

Passwordless Authentication without Secrets!

Passwordless Authentication without Secrets! divya Fri, 10/11/2024 - 08:54 As user expectations for secure and seamless access continue to grow, the 2024 Thales Consumer Digital Trust Index (DTI) research revealed that 65% of users feel ...

The Sky is Falling! (Again)

We’ve been here before, haven’t we? Every other week, a new vulnerability with a sky-high CVSS score causes a frenzy. This time, it’s a 9.9 CVSS vulnerability that was billed as a gift to hackers – a remote exploit that would supposedly ...

Ubuntu 24.10 Oracular Oriole brings tighter security controls

Canonical released Ubuntu 24.10 Oracular Oriole, which brings notable advancements, including an updated kernel, new toolchains, and the GNOME 47 desktop environment, along with significant enhancements in software security. “Oracular Oriole ...

Cloud Ransomware Attack: Microsoft Sees Storm-0501 As Threat

Microsoft has recently identified a threat actor known as Storm-0501 targeting government, manufacturing, transportation, and law enforcement sectors in the United States (US) in a cloud ransomware attack campaign. In this article, we’ll dive ...

Resilience in extreme conditions: Why DDIL environments need continuous identity access

Ensuring seamless operations in even the harshest environments is a necessity today. For organizations operating within the Department of Defense (DoD) space, identity resilience and continuity are essentially non-negotiable — as the stakes are ...

Data loss incidents impact patient care

92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a result, according to Proofpoint. Healthcare organizations struggle to ...

DORA regulation’s nuts and bolts

The frequency, sophistication, and impact of cyber-attacks on financial institutions have been rising. Given the economic system’s interconnected nature, disruptions in one institution can have cascading effects on the broader financial ...

Unlocking the power of cryptographic agility in a quantum world

In this Help Net Security interview, Glen Leonhard, Director of Key Management at Cryptomathic, discusses the role of cryptographic agility in mitigating risks posed by quantum computing. Cryptographic agility enables organizations to seamlessly ...