Application Security News and Articles


Why We’re Stuck With Passwords

Passkeys are the future, but the future is definitely not evenly distributed yet. We're all stuck with passwords until a lot more companies offer passkeys. The post Why We’re Stuck With Passwords appeared first on Security Boulevard.

The Differences Between DNS Protection and Protective DNS

DNS Protection, Protective DNS and DNS Security … What’s the Difference? In the ever-evolving landscape of cybersecurity, staying ahead of threats is paramount. Two terms that often surface in discussions about online safety are DNS ...

Top 5 Fears That Keep IT Professionals Up at Night

Forget witches and zombies. For IT pros, the scariest monsters lurk in the digital realm. While most people are busyRead More The post Top 5 Fears That Keep IT Professionals Up at Night appeared first on Kaseya. The post Top 5 Fears That Keep IT ...

Digital.ai launches Denali to accelerate enterprise software delivery at scale

Digital.ai has unveiled the launch of Denali, the latest release of its AI-powered DevSecOps platform, exemplifying its commitment to delivering an open platform tailored to the needs of the modern enterprise. The platform allows companies to ...

New Project Analyzes and Catalogs Vendor Support for Secure PLC Coding

A new project aims to make it easier for PLC programmers to implement secure coding practices by cataloging useful files and functions from each vendor. The post New Project Analyzes and Catalogs Vendor Support for Secure PLC Coding appeared ...

Teleport Identity Governance and Security reduces attack surface area

Teleport released Teleport Identity Governance and Security, a product that secures and governs services, and user identities across multiple clouds, environments and SaaS applications. This new product reduces attack response times by providing ...

Censys Banks $75M for Attack Surface Management Technology

Michigan startup raises $75 million in new funding as venture capital investors bet big on attack surface management technologies. The post Censys Banks $75M for Attack Surface Management Technology appeared first on SecurityWeek.

News alert: Flexxon welcomes distinguished industry veteran Ravi Agarwal to its advisory board

Singapore, Oct. 25, 2023 – Hardware cybersecurity solutions pioneer Flexxon (the “Company”) today announced the appointment of ex-Intel and Microsoft executive Mr Ravi Agarwal to its advisory board. An industry veteran with over three ...

How to secure the WordPress wp-config.php configuration file

Securing your WordPress wp-config.php file is one way to beef up your WordPress security. It is one of the most important WordPress files and contains very sensitive information about your WordPress installation, such as the WordPress security ...

NextGen Mirth Connect Remote Code Execution Vulnerability (CVE-2023-43208)

Mirth Connect, by NextGen HealthCare, is an open source data integration platform widely used by healthcare companies. Versions prior to 4.4.1 are vulnerable to an unauthenticated remote code execution vulnerability, CVE-2023-43208. If you’re a ...

The Cybersecurity Resilience Quotient: Measuring Security Effectiveness

The Cybersecurity Resilience Quotient empowers organizations to assess their security posture comprehensively, considering asset exposure, vulnerabilities, and criticality alongside process and network architecture and disaster recovery plans. ...

VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10. The post VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products appeared first on SecurityWeek.

SentinelOne introduces Singularity Threat Intelligence for enhanced threat landscape understanding

SentinelOne has launched Singularity Threat Intelligence, a solution that offers security teams an end-to-end view of the threat landscape, along with deep, actionable insights to combat adversaries and minimize risk within the SentinelOne ...

Cloud-Native Security: A Tipping Point for Security Teams’ Productivity

cloud-native application development has caused a veritable maelstrom for security teams. The post Cloud-Native Security: A Tipping Point for Security Teams’ Productivity appeared first on Security Boulevard.

Axiomatics Taps Generative AI to Make Access Control Simpler

Axiomatics added a generative AI capability to its ABAC solution that makes it possible to use natural language to write policies. The post Axiomatics Taps Generative AI to Make Access Control Simpler appeared first on Security Boulevard.

Critical Infrastructure Stakeholders Gather for Day 2 of SecurityWeek’s 2023 ICS Cybersecurity Conference

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference. The post Critical Infrastructure Stakeholders Gather ...

CyCognito platform enhancements help users identify and protect unmanaged assets

CyCognito announced a major platform expansion of its External Attack Surface Management (EASM). The latest release includes extended visibility across cloud assets, web application API endpoints and web application firewalls (WAFs), enhanced web ...

How AI is Transforming Defensive Cybersecurity

In the rapidly evolving world of cybersecurity, adopting artificial intelligence (AI) is proving to be a game changer for defense teams. AI offers a multitude of benefits, revolutionizing defensive operations and providing a competitive edge in ...

App sec prioritization is priority No. 1 for CISOs

As application security and DevSecOps teams try to get the most bang for their app sec buck, one of the perennial problems has been figuring out where to focus their secure coding and vulnerability remediation efforts. The scale of ...

Ten Proactive Strategies to Mitigate Zero-Day Threats

Patching is critical, but what else can security teams do to stay ahead of zero-day threats? After running a poll on our TrueFort LinkedIn Page last week, asking our friends and followers in the trenches their biggest current security concerns, ...