Application Security News and Articles


Ask the Analyst: Nisos Events and Ticket Fraud Expert Kirk Maguire

Nisos Ask the Analyst: Nisos Events and Ticket Fraud Expert Kirk Maguire With the Olympics on the horizon, what trends in ticket fraud have you observed from... The post Ask the Analyst: Nisos Events and Ticket Fraud Expert Kirk Maguire appeared ...

How to Drive Down Skyrocketing Data Costs with the Only Cost-Optimized SIEM

Harnessing and interpreting data insights for actionable solutions lies at the heart of a robust cybersecurity strategy. For many SecOps teams, wrangling vast volumes of disparate data poses a significant challenge. Collecting and centralizing ...

RSAC Fireside Chat: IRONSCALES utilizes LLM, superior intel to stay a step ahead of Deep Fakes

There was a lot of buzz at RSAC 2024 about how GenAI and Large Language Models (LLM) are getting leveraged — by both attackers and defenders. Related: Is your company moving too slow or too fast on GenAI? One promising … (more…) The post ...

What is ISO 42001? Structure, Responsibilities and Benefits

This quick read will get you up to speed on ISO 42001 - what it is, who's responsible for what, and why it matters for ethical AI. The post What is ISO 42001? Structure, Responsibilities and Benefits appeared first on Scytale. The post What is ...

Best Security Questionnaire Automation Software – Top Features To Look For

In an increasingly interconnected digital landscape, the reliance on third-party vendors, partners, and service providers continues to grow. Ensuring their adherence to stringent security standards and regulatory requirements is no longer ...

Thales & LuxTrust: A Partnership for Data Sovereignty and Compliance

Thales & LuxTrust: A Partnership for Data Sovereignty and Compliance madhav Tue, 05/21/2024 - 06:08 With the recent publication of Regulatory Technical Standards (RTS) under Digital Operational Resilience Act (DORA) by the European ...

49 Million Customers Impacted by API Security Flaw

How safe is your data? With the increasing reliance on online services, this question weighs heavily on everyone’s mind. The recent cyber incident serves as a wake-up call, exposing a vulnerability we often overlook: the security of APIs.  A ...

Strategies for combating AI-enhanced BEC attacks

In this Help Net Security interview, Robert Haist, CISO at TeamViewer, discusses how AI is being leveraged by cybercriminals to enhance the effectiveness of BEC scams. How is AI being leveraged by cybercriminals to enhance the effectiveness of ...

Phishing statistics that will make you think twice before clicking

This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape. AI-driven phishing attacks deceive even the most aware users Zscaler | Zscaler ThreatLabz 2024 Phishing Report | ...

YouTube has become a significant channel for cybercrime

Social engineering threats – those which rely on human manipulation – account for most cyberthreats faced by individuals in 2024, according to Avast. According to the latest quarterly Avast Threat Report, which looks at the threat landscape ...

Fighting identity fraud? Here’s why we need better tech

In this Help Net Security video, Patrick Harding, Chief Architect at Ping Identity, discusses the state of identity fraud prevention. Businesses must adopt more advanced technologies to combat the advancing tactics of identity fraud. ...

eBook: 10 reasons why demand for cloud security is sky-high

Current demand for cloud security specialists far exceeds available talent. Especially for companies seeking protection in multicloud environments, professionals with vendor-neutral knowledge and skills to their hiring wish lists. Find out how ...

Challenging Times Remain Among the Ever-Evolving Email Landscape

Criminals are successfully using email to scam, infiltrate networks, and unleash malicious payloads. We’re continuing to witness bad actors relentlessly exploit human vulnerabilities and software flaws, circumventing email gateways and security ...

Shifting the Security Mindset: From Network to Application Defense

Web application development and usage are at an all-time high, but businesses aren’t sure which APIs to monitor or how to protect them. The post Shifting the Security Mindset: From Network to Application Defense appeared first on Security ...

On-Prem Misconfigurations Lead to Entra Tenant Compromise 

As enterprises continue to transition on-premises infrastructure and information systems to the cloud, hybrid cloud systems have emerged as a vital solution, balancing the benefits of both environments to optimize performance, scalability, and ...

USENIX Security ’23 – You’ve Got Report: Measurement and Security Implications of DMARC Reporting

Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

An Open Letter to API Vendors: Embrace Secure Authentication Methods, Abandon API Keys

3 min read As the demand for API access continues to grow, so does the urgency of adopting more secure authentication methods. The post An Open Letter to API Vendors: Embrace Secure Authentication Methods, Abandon API Keys appeared first on ...

Randall Munroe’s XKCD ‘Bloom Filter’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Bloom Filter’ appeared first on Security Boulevard.

HYAS Threat Intel Report May 20 2024

Weekly Threat Intelligence Report Date: May 20, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS Cyber Threat Intelligence Analysis This week in the HYAS Insight threat intelligence platform, we found a concerning ...

Understanding B2B and B2C AI: A Simple Guide

Confused about B2B vs. B2C AI? This simple guide breaks down the key differences, use cases, and benefits for businesses and consumers. The post Understanding B2B and B2C AI: A Simple Guide appeared first on Security Boulevard.