Application Security News and Articles


Day 3 of SecurityWeek’s 2023 ICS Cybersecurity Conference — Challenges and Solutions

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, with challenges and solutions the focus of Day 3. The post Day 3 of SecurityWeek’s 2023 ICS Cybersecurity Conference — Challenges and Solutions appeared first on ...

Humans are still better than AI at crafting phishing emails, but for how long?

Humans are still better at crafting phishing emails compared to AI, but not by far and likely not for long, according to research conducted by IBM X-Force Red. Creating phishing emails: Humans vs. AI The researchers wanted to see whether ChatGPT ...

Four Steps to Integrate Zero-Trust

So, how do you know who to trust in your company when it comes to protecting your most sensitive data? The answer: No one. The post Four Steps to Integrate Zero-Trust appeared first on Security Boulevard.

Tufin Orchestration Suite R23-2 helps enterprises to fully optimize SASE approach

Tufin released Tufin Orchestration Suite (TOS) version R23-2. The latest edition streamlines Secure Access Service Edge (SASE) policy management across an organization’s hybrid network, expedites security audits and compliance efforts, and ...

D.C. Voter Data Leak: What We Know So Far

The District of Columbia Board of Elections (DCBOE) has reported a security incident involving the breach of a web server hosted by DataNet Systems, a hosting provider. This breach, which occurred in early October, potentially allowed ...

Creating a Cyber Attack Disaster Recovery Plan Template

There’s almost no telling when a cyber attack could impact your school district. And, when it does, you’ll wish you had a standardized process in place for keeping the damage to a minimum. Fortunately, that’s exactly what a disaster ...

New NSA Information from (and About) Snowden

Interesting article about the Snowden documents, including comments from former Guardian editor Ewen MacAskill MacAskill, who shared the Pulitzer Prize for Public Service with Glenn Greenwald and Laura Poitras for their journalistic work on the ...

Fortinet expands Universal SASE offering to empower today’s hybrid workforce

Fortinet announced the expansion of its Universal SASE offering to empower today’s hybrid workforce with FortiOS everywhere. “The Fortinet operating system, FortiOS, is the industry’s only enterprise-grade converged operating system able to ...

Seemplicity integrates with Wiz to accelerate remediation

Seemplicity announced its technical integration with cloud security provider Wiz. As a certified Wiz Integration (WIN) platform partner, Seemplicity enables joint customers to seamlessly integrate its Security Remediation Operations platform into ...

Creating a Culture of Cybersecurity Part I: The 8 Benefits of Insourcing Your IT Help Desk

By: Logan Myerz, Director of Internal IT Support, CISO Global, Inc. Preface:  What is the culture of cybersecurity, anyway? When most people hear the phrase “Cybersecurity is a Culture,” their minds jump immediately to cybersecurity ...

Quishing: Tricks to look out for

QR code phishing – aka “quishing” – is on the rise, according to HP, Darktrace, Malwarebytes, AusCERT, and many others. What are QR codes? QR codes are two-dimensional matrix barcodes used for tracking products, ...

ISO 27001 Mandatory Documents: A Guide to Achieving Compliance

Achieving ISO 27001 certification is a significant milestone for organizations seeking to establish robust information security management systems (ISMS). ISO 27001 is designed to adapt to each organization’s unique needs, acknowledging that ...

OT cyber attacks proliferating despite growing cybersecurity spend

The sharp increase in attacks on operational technology (OT) systems can be primarily attributed to two key factors: the escalating global threats posed by nation-state actors and the active involvement of profit-driven cybercriminals (often ...

GOAD: Vulnerable Active Directory environment for practicing attack techniques

Game of Active Directory (GOAD) is a free pentesting lab. It provides a vulnerable Active Directory environment for pen testers to practice common attack methods. GOAD-Light: 3 vms, 1 forest, 2 domains “When the Zerologon vulnerability ...

Ransomware groups continue to increase their operational tempo

Q3 of 2023 continued an ongoing surge in ransomware activity, according to GuidePoint Security. GuidePoint Research and Intelligence Team (GRIT) observed a nearly 15% increase in ransomware activity since Q2 due to an increased number of ...

Citrix NetScaler ADC and Gateway Sensitive Information Disclosure Vulnerability (CVC-2023-4966) Notification

Overview Recently, NSFOCUS CERT detected a sensitive information disclosure vulnerability in Citrix NetScaler ADC and Gateway (CVE-2023-4966). When the device is configured as a gateway (VPN virtual server, ICA proxy, CVPN, RDP proxy) or AAA ...

CISOs struggling to understand value of security controls data

Many CISOs are grappling with the conundrum of the purpose and value of security controls data in supporting critical business decisions, according to Panaseer. The biggest concern when taking on a new CISO role is receiving an inaccurate audit ...

NSFOCUS Achieves Three Certifications, Paving the Path to Sustainable and Environmentally Responsible Development

SANTA CLARA, Calif., Oct 26, 2023 – NSFOCUS, a global leader in intelligent hybrid security solutions, proudly announces its recent acquisition of three significant certifications: the “Verification Statement of Greenhouse Gas Emissions,” ...

Banyan Security CSO Den Jones Shines in CyberArk Impact 23 Fireside Chat

CSO Den Jones participated in a fireside chat with Santosh Prusty at CyberArk IMPACT 23, discussing security tools, industry challenges, and, AI security. The post Banyan Security CSO Den Jones Shines in CyberArk Impact 23 Fireside Chat first ...

Ripcord Transforms, Anitian Empowers, Agencies Win

As far back as 2011 a presidential mandate said, “Records are the foundation of open government.” This mandate went on to say that accessible, readable public records supported the “principles of transparency, participation, and ...