Application Security News and Articles


Dialpad PII Redaction enhances privacy protection

Dialpad released PII Redaction, an Ai-powered feature designed to fortify privacy safeguards of personal identifiable information (PII) and empower users with greater control over their data. As part of Dialpad Ai, a proprietary automatic speech ...

National Cybersecurity Infrastructure Efforts Bearing Fruit

The U.S. is making progress bolstering its cybersecurity infrastructure, according to a Cyberspace Solarium Commission (CSC) report. The post National Cybersecurity Infrastructure Efforts Bearing Fruit appeared first on Security Boulevard.

Bitdefender Threat Intelligence enables organizations to improve their security posture

Bitdefender unveiled Bitdefender Threat Intelligence (TI), a solution for businesses with a security operation center (SOC), managed security service providers (MSSPs) and technology partners to integrate cyber threat intelligence and dynamic ...

Blackpoint Cyber unveils Cloud Response for Google Workspace

Blackpoint Cyber has announced the expansion of its cloud security product, Cloud Response, to Google Workspace. Blackpoint first introduced Cloud Response for Microsoft 365, the first true Managed Detection and Response (MDR) service in the ...

Cloudflare Users Exposed to Attacks Launched From Within Cloudflare: Researchers

Gaps in Cloudflare’s security controls allow users to bypass protections and target others from the platform itself. The post Cloudflare Users Exposed to Attacks Launched From Within Cloudflare: Researchers appeared first on SecurityWeek.

Conceal partners with CyberForce Security to elevate MSSP services with advanced browser security

Conceal announced strategic alliance with CyberForce Security. This collaboration is set to enhance CyberForce’s already comprehensive technology suite by including ConcealBrowse’s elite browser security. “We are thrilled to ...

A Key US Government Surveillance Tool Should Face New Limits, a Divided Privacy Oversight Board Says

A sharply divided privacy oversight board is recommending that the FBI and other agencies be required to get court approval before reviewing the communications of U.S. citizens collected through a secretive foreign surveillance program. The post ...

NIST Publishes Final Version of 800-82r3 OT Security Guide

NIST has published the final version of the SP 800-82 Revision 3 guide to operational technology (OT) security. The post NIST Publishes Final Version of 800-82r3 OT Security Guide appeared first on SecurityWeek.

Nexusflow raises $10.6 million to improve generative AI in cybersecurity

Nexusflow announced that it has raised a $10.6 million seed round led by Point72 Ventures, with participation from Fusion Fund and several AI luminaries in Silicon Valley. Nexusflow was founded by AI experts Professor Jiantao Jiao and Professor ...

FBI Warns Organizations of Dual Ransomware, Wiper Attacks

The FBI warns organizations of cyberattacks that employ multiple ransomware families or deploy dormant data wipers. The post FBI Warns Organizations of Dual Ransomware, Wiper Attacks appeared first on SecurityWeek.

Johnson Controls Hit by Ransomware

Johnson Controls has confirmed being hit by a disruptive cyberattack, with a ransomware group claiming to have stolen 27Tb of information from the company. The post Johnson Controls Hit by Ransomware appeared first on SecurityWeek.

What Is mTLS? The Essential Guide You Can’t Afford to Miss

Intro: mTLS — The Unsung Hero of Cybersecurity Picture this: You're a secret agent on a high-stakes mission. You have a briefcase full of confidential information that you need to hand over securely. Sure, you could pass it to another agent, ...

Ann Minooka joins Synopsys as CMO

Synopsys announced the appointment of Ann Minooka as the company’s Chief Marketing Officer, reporting to Sassine Ghazi, president and COO of Synopsys. Minooka joins the company with more than two decades of marketing leadership experience ...

Methods To Protect Yourself From Identity Theft

Identity theft involves stealing personal information without consent, usually for financial gain. The post Methods To Protect Yourself From Identity Theft appeared first on Security Boulevard.

The Role of DNS in Email Security

DNS-based email security and authentication configurations play a pivotal role in securing your digital defences against cyber attacks. The post The Role of DNS in Email Security appeared first on Security Boulevard.

New Age Phishing Threats and How to Plan Ahead

These new age phishing threats utilize sophisticated tactics like social engineering, which make them challenging to detect and mitigate. The post New Age Phishing Threats and How to Plan Ahead appeared first on Security Boulevard.

Challenges and Solutions Implementing Segregation of Duties

Top 8 Challenges and Solutions for Implementing Segregation of Duties and the Role of Access GovernanceIn intricate digital business operations, safeguarding integrity and security is paramount. One indispensable tool in achieving this goal is ...

Segregation of Duties in Financial Institutions

Segregation of Duties in Financial Institutions:Ensuring Accountability and SecurityFinancial institutions play a key role in our global economy, managing vast sums of capital, sensitive financial data, and critical economic transactions. These ...

The Importance of Segregation of Duties in Auditing

The Importance of Segregation of Duties in Auditing ExcellenceAuditing is an important practice for any organization, regardless of size or industry. It safeguards your business's financial integrity, ensuring that your financial reporting ...

How to Get ISO 27001:2022 Compliant?

The ISO 27001:2022 standard for information security management systems (ISMS) is widely recognized. It is made to help businesses protect sensitive data. This helps businesses to ensure their confidentiality, integrity, and availability. The ...