Application Security News and Articles


Automotive cybersecurity: A decade of progress and challenges

As connected cars become a standard feature in the market, the significance of automotive cybersecurity rises, playing an essential role in ensuring the safety of road users. In this Help Net Security video, Samantha Beaumont, Principal Security ...

Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again

In this episode, we discuss the Mozilla Foundation’s alarming report that reveals why cars are the top privacy concern. Modern vehicles, equipped with data-collecting tech, pose significant risks to consumers’ privacy, with data sharing even ...

Incentivizing secure online behavior across generations

As the landscape of online security continues to evolve, there is a noticeable shift in people’s perceptions of cybersecurity, with an increasing awareness of its vital role in staying safe online, according to a survey conducted by the ...

Companies rethinking degree requirements for entry-level cybersecurity jobs

While the threat landscape is evolving for most on the front lines, little has changed in recent years, according to ISACA. The research finds that of the cybersecurity professionals who said they were experiencing an increase or decrease in ...

Cyber insurance costs pressure business budgets

Cyber insurance is a type of insurance policy that provides financial protection and support to individuals and organizations in the event of cyber incidents, including data breaches, hacking, ransomware attacks, and other cyber threats. It ...

Top 25 SANS Vulnerabilities in 2023

The SANS Top 25 vulnerabilities stand as a meticulously curated collection of critical software flaws, meticulously identified through…Continue reading on Medium »

Top 25 SANS Vulnerabilities in 2023

The SANS Top 25 vulnerabilities stand as a meticulously curated collection of critical software flaws, meticulously identified through…Continue reading on Medium »

8 ways MSSPs gain competitive advantage with the SecOps Cloud Platform

Earlier this year, we introduced the LimaCharlie SecOps Cloud Platform (SCP). The SCP is a unified platform for modern cybersecurity operations. Similar to what the public cloud did for IT, the SCP offers security teams core cybersecurity ...

DEF CON 31 – Benny Zeltser’s, Jonathan Lusky’s ‘Ringhopper – How We Almost Zero Day’d The World’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Improve productivity by slowing down your email

Manage teams better by delaying your email! Improve productivity by slowing down your email. Email programs increasingly include the ability to schedule your emails. You can choose when they are sent – in the future, not the past. (They’re ...

Granular Permission Control: Do Organizations Need it?

The modern workplace is constantly evolving, with organizations of all sizes needing to keep up with the ever-changing landscape. One essential part of ensuring a secure working environment is having the right permission control in place.  ...

AI With Critical Infrastructure, Smart Glasses and Cyber: What’s the Latest?

There have been several important developments, conferences and speeches on artificial intelligence and cybersecurity trends over the past few months. Here’s a roundup. The post AI With Critical Infrastructure, Smart Glasses and Cyber: What’s ...

Week in review: Patch Tuesday forecast, 9 free ransomware guides, Cybertech Europe 2023

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Photos: Cybertech Europe 2023 The Cybertech Europe conference and exhibition takes place at La Nuvola Convention Center in Rome, and features ...

Discovering CIS Controls in 2023: Exploring Guide To Robust Security

Introduction: Why You Can’t Ignore CIS Controls in 2023 In today’s digital landscape, the rising cybersecurity threats targeting small businesses are more alarming than ever. As depicted in the bar chart, the number of incidents has surged ...

How is Malware Detected in 2023? Uncover the Latest Techniques

Introduction In 2023, malware detection has never been more critical. As cyber threats evolve, understanding the latest techniques to identify and block malicious software is essential for safeguarding your digital assets. This article delves ...

DEF CON 31 – Mieke Eoyang’s ‘There Are No Mushroom Clouds In Cyberwar’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

2023 OWASP Top-10 Series: Spotlight on Injection

Welcome to the 12th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. In this series we are taking an in-depth look at each category – the details, the impact and what ...

Taiwan Probes Firms Suspected of Selling Chip Equipment to China’s Huawei Despite US Sanctions

Taiwan authorities are investigating four Taiwan-based companies suspected of helping China’s Huawei Technologies to build semiconductor facilities. The post Taiwan Probes Firms Suspected of Selling Chip Equipment to China’s Huawei Despite US ...

SaaS Security in Healthcare: What You Need to Know

The migration to SaaS has resulted in the distribution of valuable data across a number of highly decentralized cloud applications. While the security impact of this shift can be felt across all sectors, it weighs particularly heavily on ...

Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

Today’s evolving and expanding threat landscape has rendered traditional security measures inadequate for safeguarding sensitive data and systems. Organizations grapple with elevated risks as malicious actors continuously devise new ways to ...