Application Security News and Articles


Cloud Penetration Testing: A Detailed Step-by-Step Guide

As businesses increasingly migrate to the cloud, ensuring the security of cloud infrastructure becomes paramount. Cloud security testing, particularly cloud penetration testing, is critical to identifying and mitigating security vulnerabilities ...

RSAC Fireside Chat: Tightened budgets impose discipline on CISOs, resets security investments

CISOs have been on something of a wild roller coaster ride the past few years. Related: Why breaches persist When Covid 19 hit in early 2020, the need to secure company networks in a new way led to panic spending … (more…) The post RSAC ...

Commando Cat Docker Cryptojacking: Alert & Prevention Tips

Recent reports have unveiled a concerning cyber threat orchestrated by a group identified as Commando Cat. This threat actor has been actively engaging in cryptojacking campaigns, leveraging vulnerabilities in Docker instances to deploy ...

Closing the Readiness Gap: How to Ensure a Fast Recovery From the Inevitable Cyber Attack

While many businesses invest heavily in frontline defense tools to keep out bad actors, they spend far less time and money preparing for what happens when the criminals eventually get in. The post Closing the Readiness Gap: How to Ensure a Fast ...

From passwords to passkeys: Enhancing security and user satisfaction

In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and improves user experience by simplifying the login process. Lamb also ...

Improving OT cybersecurity remains a work in progress

Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network environments continue to converge, according to Fortinet. Cyberattacks ...

Most cybersecurity pros took time off due to mental health issues

Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick leave – costing US enterprises almost $626 million in lost productivity every year, ...

eBook: CISO guide to password security

Password security has seen dramatic shifts driven by the escalation of cyber threats and technological advancements. This eBook covers: Best practices for NIST-compliant password security Key benefits of automating password policies It is not ...

Obtaining Security Budgets You Need (Not Deserve): Ira Winkler’s Cybersecurity Playbook for Executives

The biggest problem in cyber security is that CISOs get the budgets they deserve, not the budgets they need—and they need to learn to deserve what they need. The post Obtaining Security Budgets You Need (Not Deserve): Ira Winkler’s ...

Managing Transitive Vulnerabilities

Transitive vulnerabilities are developers’ most hated type of security issue, and for good reason. It’s complicated enough to monitor for and fix direct vulnerabilities throughout the software development lifecycle (SDLC). When software is ...

New Blog Moderation Policy

There has been a lot of toxicity in the comments section of this blog. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments, but also sniping and personal attacks. It’s gotten so bad that I need to do ...

USENIX Security ’23 – BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing

Authors/Presenters:Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from ...

The Fundamental Issues with Email and How PreVeil Addresses Them

Email is the backbone of modern communication, both in personal and professional settings. Despite its widespread use and critical importance, traditional email systems suffer from significant security vulnerabilities at three key points: the ...

IRONSCALES Applies Generative AI to Phishing Simulation

IRONSCALES has made generally available a phishing simulation tool that makes use of generative artificial intelligence (AI) to enable cybersecurity teams to create as many as 2,000 simulations of a spear phishing attack in less than an hour. The ...

Next-Generation VPN Security Needs To Be Quantum Safe

Everytime you connect to the internet, cryptography keeps your communication safe and secure. The digital age thrives on the secure exchange of information. But how safe is your communication? According to the FBI (Federal Bureau of ...

DNS and Your Privacy: Should you use encrypted DNS?

DNS enables the easy navigation from website to website as you currently know it. However, the system wasn’t exactly designed with your privacy and security in mind. Many DNS resolvers - such as your internet service provider's (ISP) - do not ...

Juneteenth National Independence Day 2024

Permalink The post Juneteenth National Independence Day 2024 appeared first on Security Boulevard.

Implementing AI in Startups: Key Strategies for Success

Artificial Intelligence (AI) is revolutionizing industries by enabling smarter decisions, automating tasks, and providing deeper insights. For startups, implementing AI projects can be a game-changer,...Read More The post Implementing AI in ...

The Distributed Workforce: Why Flexibility and Trust are Essential in Cybersecurity

A distributed workforce allows us to secure a globally connected world. It widens our talent pool, accelerates innovation, and increases our 24/7 vigilance The post The Distributed Workforce: Why Flexibility and Trust are Essential in ...

USENIX Security ’23 – AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering

Authors/Presenters:Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations ...