Application Security News and Articles


SASE Firm Cato Networks Raises $238 Million at $3 Billion Valuation

SASE company Cato Networks has raised $238 million in equity investment, bringing total funding to $773 million. The post SASE Firm Cato Networks Raises $238 Million at $3 Billion Valuation appeared first on SecurityWeek.

Red Hat and Intel deliver open source industrial automation to the manufacturing shop floor

Red Hat announced a new industrial edge platform, designed in collaboration with Intel, that will provide a modern approach to building and operating industrial controls. By transforming the way manufacturers operate, scale and innovate with ...

Egnyte collaborates with Microsoft to drive the hybrid workforce

Egnyte announced an enhanced relationship with Microsoft that provides customers with additional real-time document collaboration and sharing features through Microsoft 365 and a Microsoft Teams integration that makes it easy for customers to ...

Shadow IT: Security policies may be a problem

3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they ...

What AppSec and developers working in cloud-native environments need to know

All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for managing internal processes, interacting with customers, or analyzing ...

18 free Microsoft Azure cybersecurity resources you should check out

Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the way for the future. Whether you’re looking to build, run, or ...

Rising OT/ICS cybersecurity incidents reveal alarming trend

60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according to Rockwell Automation. This corroborates other industry research ...

Security concerns and outages elevate observability from IT niche to business essential

Enterprises that leverage observability increase operational efficiency and grow revenue, according to SolarWinds. The report explores how enterprises can act proactively to maximise the advantages of their observability solutions, integrate best ...

Strong compliance management is crucial for fintech-bank partnerships

72% of banks and credit unions are prioritizing compliance when evaluating fintechs, citing it as their top criteria in the due diligence process, according to Ncontracts. As banks and credit unions evaluate fintech partnerships, cybersecurity ...

UK Minister Warns Meta Over End-to-End Encryption

Britain's interior minister warned Meta that out end-to-end encryption on its platforms must "not to come at a cost to our children's safety". The post UK Minister Warns Meta Over End-to-End Encryption appeared first on SecurityWeek.

8 Essential Insights for Enabling E-Commerce Social Login

E-commerce social login is the way forward for businesses looking to simplify user authentication and improve the overall user experience. However, success lies in the details, from offering multiple social login options to prioritizing data ...

Apptega Lands 39 Badges, including GRC Momentum Leader, in Fall G2 Reports

Apptega, the end-to-end GRC platform for forward-thinking IT and managed service providers, earned 39 high-performer and momentum leader badges in G2’s fall reports, reflecting an acceleration of its mission to simplify cybersecurity ...

Black Hat: Anna Belak, Sysdig

Speaker 1: This is Techstrong TV. Alan Shimel: Hey everyone. Welcome back to our Techstrong TV coverage, live at Black Hat here in the desert in Las Vegas, and it’s hot like a desert. I don’t know how many of you have been to Vegas ...

LockBit Affiliates Use RMM Software in Ransomware Attacks

Affiliates of the Russia-linked LockBit ransomware group are using remote monitoring and management (RMM) software to distribute its malicious payload to organizations and their downstream customers and partners. Researchers with cybersecurity ...

Black Hat: Stephen Chin, JFrog

Speaker 1: This is Techstrong TV. Alan Shimel: Hey everyone. We’re back here live in our Mandalay Bay suite at Black Hat. It’s just downstairs. It’s still crazy. Stephen, there’s so many people down there. It’s like ...

CrowdStrike to Acquire Application Intelligence Startup Bionic

The cash-and-stock transaction provides capabilities for CrowdStrike to beef up its enterprise cloud security portfolio. The post CrowdStrike to Acquire Application Intelligence Startup Bionic appeared first on SecurityWeek.

Cyber Week 2023 & The Israel National Cyber Directorate Presents – AI & Cyber

Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National ...

Black Hat: Deepen Desai, Zscaler

Speaker 1: This is Techstrong TV. Mitch Ashley: Hey, everybody, Mitch Ashley. I am at the Mandelay Bay Suite, the studio host for Techstrong here at Black Hat in 2023 Las Vegas. We’re talking a lot of great folks, and I have a great ...

Unmasking Reverse Proxy Phishing: Protecting Your Online Identity

Phishing attacks have long been a major concern in the cybersecurity landscape. These malicious attempts to steal sensitive information often involve creating fake websites that mimic legitimate ones, tricking unsuspecting users into revealing ...

Top Cybersecurity Events

September 2023   14th Annual Billington Cybersecurity Summit Sponsor: Billington CyberSecurity Location: Washington, D.C. September 5 – 8, 2023   The 14th Annual Billington Cybersecurity Summit will take place September 5–8, 2023, at the ...