Application Security News and Articles


The 10 most common cyber security myths

The post The 10 most common cyber security myths appeared first on Click Armor. The post The 10 most common cyber security myths appeared first on Security Boulevard.

Black Hat Fireside Chat: Flexxon introduces hardened SSD drives as a last line defense

Creating ever smarter security software to defend embattled company networks pretty much sums up the cybersecurity industry. Related: The security role of semiconductors Cutting against the grain, Flexxon, a Singapore-based supplier of NAND ...

IoT Security Best Practices: 2023 Guide to Safeguard Your Devices

Introduction: The Rising Importance of IoT in 2023 In the digital age, the Internet of Things (IoT) has emerged as a revolutionary force, reshaping how businesses operate and individuals live. From smart thermostats regulating our home ...

Hackers and scammers target classrooms with ransomware. What can you do?

The school bell rings, kids of all ages take their seats, and there's an atmosphere of anticipation. Students open their textbooks and laptops, ready to explore language, history, science, and math, and further expand their horizons. Yet, ...

Coalition Report Reveals Ransomware Resurgence

A Coalition report showed a a 12% increase in claims made in the first half of this year—driven largely by a spike in ransomware attacks and funds transfer fraud (FTF). The post Coalition Report Reveals Ransomware Resurgence appeared first on ...

XDR vs SIEM vs SOAR: Choosing The Best Security Solution

The post XDR vs SIEM vs SOAR: Choosing The Best Security Solution appeared first on Low-Code Security Automation & SOAR Platform | Swimlane. The post XDR vs SIEM vs SOAR: Choosing The Best Security Solution appeared first on Security ...

Intel Launches New Attestation Service as Part of Trust Authority Portfolio

Intel announces general availability of attestation service that is part of Trust Authority, a new portfolio of security software and services. The post Intel Launches New Attestation Service as Part of Trust Authority Portfolio appeared first on ...

Jeff Nathan: Build Discipline into Threat Research for Detection Engineering that Benefits Customers

We are excited to have Jeff Nathan as our Director of Detection Engineering. His experience applying discipline to threat research to solve complex problems, and his passion for building “always-learning” teams, are a great win for our ...

Randall Munroe’s XKCD ‘Haunted House’

via the comic artistry and dry wit of Randall Munroe, maker of XKCD! Permalink The post Randall Munroe’s XKCD ‘Haunted House’ appeared first on Security Boulevard.

The Role and Responsibilities of a Data Center Technician

Data centers serve as the lifeblood of our modern digital world. They house the essential servers, storage devices, and networking equipment that enable seamless access and sharing of information for both businesses and individuals. But beyond ...

Don’t Snooze on These Cloud Application Security Best Practices

Cloud applications have revolutionized how businesses operate, providing new levels of flexibility, scalability, and increased opportunities for innovation. However, as companies continue to rely on cloud-based apps and services, they’re ...

Wing Security releases SaaS protection tier for mid-market companies

Wing Security launched its new SSPM for Compliance tier, enabling midmarket companies to adopt SaaS solutions while meeting a base level of security required by compliance frameworks. Customers who are seeking a comprehensive 24×7 posture ...

1Password introduces mobile support for passkeys

1Password customers can now create, manage, and sign in with passkeys on a growing number of websites and apps, providing cross-platform access on iOS 17 and Android 14, as well as all major web browsers on Mac, Windows, and Linux. Later this ...

What’s New in SOC 2®: A Comprehensive Guide to the 2023 Revisions

The compliance landscape is constantly evolving, and so are the standards that govern it. SOC 2®, a widely recognized framework for assessing service organizations’ controls, has recently undergone revisions. In this blog post, we’ll dive ...

The Future of Web Scraping

If data is the new oil, then web scraping is the new oil rig. The potential impact of web scraping is escalating as the twin forces of alternative data and AI training both rapidly increase in size and complexity. The post The Future of Web ...

McAfee Scam Protection blocks fake emails, texts, and social media links

McAfee launched McAfee Scam Protection to address the rise in AI-generated phishing scams. The latest feature in McAfee’s product suite draws on patented AI technology to turn the tables on cybercriminals using AI to turbocharge scams and ...

NordVPN Sonar helps internet users detect phishing emails

NordVPN launched its first experimental project under the NordLabs platform. The AI-enabled browser extension Sonar aims to help internet users detect phishing emails and protect themselves from cybercrimes. “AI tools have facilitated the ...

Cyber Week 2023 & The Israel National Cyber Directorate Presents – Multifocal Privacy Compliance

Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National ...

Oracle Fusion Data Intelligence Platform enables users to achieve better business outcomes

Oracle announced the Fusion Data Intelligence Platform, a next-generation data, analytics, and AI platform that will help Oracle Fusion Cloud Applications customers achieve better business outcomes by combining data-driven insights with ...

You Just Bought Wiz, Here’s What’s Next

Reading Time: 5 minutes So you just bought or renewed with Wiz – well done on kicking off your cloud security journey. Cloud security is a multi-pronged program, requiring protection across workloads, platform configurations, cloud identities, ...