Application Security News and Articles


Six Ways to Foster a Security Mindset in Engineering Teams

Human error can be found at the root of the vast majority of cybersecurity breaches. According to Verizon’s 2022 Data Breach Investigations Report, 82% of global cybersecurity incidents included some level of human involvement. Security cannot ...

Identity Fabric: Why it’s Important for Identity Security

Understand what an identity fabric is and its significance for modern Identity Security. Learn why it's crucial for protecting digital identities. The post Identity Fabric: Why it’s Important for Identity Security appeared first on Security ...

DNSSEC is the Key to a Healthy Future for the Internet

The future of internet connectivity could diverge into two very different outcomes—aggressive monopolization by a few providers or a more diverse landscape that fosters innovation. The latter possibility is the better outcome, but it will ...

Embracing Biometric Identity Verification: A Look at Belgium and Kuwait Telecoms

The country’s telecom authority has given Telenet, Belgium’s largest cable broadband service provider, permission to utilise facial biometrics for remote identity verification. According to the Belgian Institute for Postal Services and ...

Digital Spring Cleaning: Tips for a More Secure Active Directory

One of the most critical aspects of digital spring cleaning is to tidy up your password hygiene to prevent unauthorized access to accounts and sensitive data in your environment. Here are several steps for organizations. The post Digital Spring ...

Eliminating Enterprise Passwords Is Now Possible

ForgeRock Announces Major Expansion of Passwordless Capabilities with the Introduction of Enterprise Connect Passwordless Ten years ago, the launch of the FIDO Alliance spurred industry-wide interest in passwordless authentication. In the years ...

Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm

Hitachi Energy has blamed a data breach affecting employees on the recent exploitation of a zero-day vulnerability in Fortra’s GoAnywhere solution. The post Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm ...

Passwordless Demystified

ForgeRock CTO Eve Maler answers seven critical questions ForgeRock's purpose is to help people simply and safely access the connected world. Passwordless capabilities are helping us do that in exciting new ways, solving problems for consumers as ...

Reasons to select Microsoft Dynamics 365 for your organization

Microsoft Dynamics 365 is a Cloud-based business application platform that combines Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) functionality into a single integrated solution. It is designed to help businesses ...

NBA Notifying Individuals of Data Breach at Mailing Services Provider

NBA is notifying individuals that their information was stolen in a data breach at a third-party mailing services provider. The post NBA Notifying Individuals of Data Breach at Mailing Services Provider appeared first on SecurityWeek.

Adobe Acrobat Sign Abused to Distribute Malware

Cybercriminals are abusing the Adobe Acrobat Sign service in a campaign distributing the RedLine information stealer malware. The post Adobe Acrobat Sign Abused to Distribute Malware appeared first on SecurityWeek.

Waterfall Security Solutions launches WF-600 Unidirectional Security Gateway

Waterfall Security Solutions launched the WF-600 Unidirectional Security Gateway, an OT security protection against remote cyber attacks. The WF-600 product line is a blend of hardware and software, enabling unbreachable protection at IT/OT ...

New York Man Arrested for Running BreachForums Cybercrime Website

Conor Brian Fitzpatrick of New York was arrested and charged last week for allegedly running the popular cybercrime forum BreachForums. The post New York Man Arrested for Running BreachForums Cybercrime Website appeared first on SecurityWeek.

TOP 7 VAPT Companies in India

Regularly testing your organization’s cybersecurity is crucial due to the constantly changing tools, tactics, and procedures utilized by cybercriminals to infiltrate networks. VAPT (Vulnerability Assessment and Penetration Testing) aids in ...

How to protect online privacy in the age of pixel trackers

Tracking pixels like the Meta and TikTok pixels are popular tools for online businesses to monitor their website visitors’ behaviors and preferences, but they do come with risks. While pixel technology has been around for years, privacy ...

The digital enterprise’s perfect partners: IGA and GRC

The digital enterprise's perfect partners: Why IGA and GRC need to work togetherBusiness processes are increasingly dependent on IT systems to support their execution. This dependence amplifies the risks stemming from the lack of segregation of ...

Why Should You Invest in AppSec?

Discover the top reasons why investing in application security (AppSec) is essential for businesses of all sizes. From protecting customer data to complying with regulations, ensure your apps are secure and your organization is protected from ...

Why DevOps needs to be DevSecOps

Although DevOps remains a popular strategy for many businesses, some are souring on the concept as expectations are failing to meet what's being delivered. Security needs to be part of it (DevSecOps) The post Why DevOps needs to be DevSecOps ...

GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation

One common misconception is that scammers usually possess a strong command of computer science and IT knowledge. Related: How Google, Facebook enable snooping In fact, a majority of scams occur through social engineering. The rise of social media ...

Detecting face morphing: A simple guide to countering complex identity fraud

Our reliance on face matching for identity verification is being challenged by the emergence of artificial intelligence (AI) and facial morphing technology. This technique involves digitally creating an image which is an average of two people’s ...