Application Security News and Articles


Randall Munroe’s XKCD ‘Iceberg Efficiency’

via the comic artistry and dry wit of Randall Munroe, maker of XKCD! Permalink The post Randall Munroe’s XKCD ‘Iceberg Efficiency’ appeared first on Security Boulevard.

LogRhythm Announces Partnership with Novacoast to Enhance Security Services Through Axon

The partnership with Novacoast, the first Axon service provider, will further strengthen security operations and ensure comprehensive protection  LogRhythm, the company helping security teams stop breaches by turning disconnected data and ...

Ping Identity introduces passwordless solution for better customer experiences

Ping Identity released PingOne for Customers Passwordless, a cloud solution that helps enterprises accelerate their passwordless initiatives and make the digital experiences for customers more convenient and seamless. PingOne for Customers ...

Deepwatch platform enhancements improve cyber resiliency for businesses

Deepwatch announced new enhancements to the Deepwatch Managed Security Platform that improve the ability for companies to anticipate, respond, recover, and withstand future cyber threats while continuously improving business resiliency. The new ...

Why IoT Raises Concerns About Identity Theft

The internet of things (IoT) — the collective name for internet-connected devices and sensors — represents a new era in technology. This hardware leverages advancements in connectivity, hardware, miniaturization, cloud computing, data ...

Entrust’s zero trust solutions enhance security of applications, encryption keys and secrets

Entrust announced new capabilities to help organizations enhance their security posture and advance their zero trust maturity journey. The new features extend protections, visibility, and governance over virtual infrastructures, code and ...

Cyber Week 2023 & The Israel National Cyber Directorate Presents – Cyber Crisis Management & Readiness

Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National ...

New SEC Cybersecurity Disclosure Requirements – What You Need to Know

New cybersecurity laws and rules continue to emerge in an ever-tightening regulatory landscape. In July 2023, the U.S. Securities & Exchange Commission (SEC) adopted new rules about disclosing cybersecurity incidents and cyber risk management ...

Security Posture Management: The Missing Link in Your Cybersecurity Strategy

Cybersecurity is a complex and dynamic field, and there are several elements that security teams must continuously monitor and manage to protect an organization's security posture. Cyber risk management strategies must focus on more than one ...

Venafi Leverages Generative AI to Manage Machine Identities

Venafi launched a proprietary generative AI model to help with the mammoth, complex, and expanding problem of managing machine identities. The post Venafi Leverages Generative AI to Manage Machine Identities appeared first on SecurityWeek.

Breach and Attack Simulation Helps Pipeline Operators Comply with New TSA Requirements

Breach and attack simulation helps pipeline operators reduce time and effort needed to comply with TSA’s requirements for enhancing cyber resilience. The post Breach and Attack Simulation Helps Pipeline Operators Comply with New TSA ...

‘Cybersecurity Incident’ Hits ICC

The International Criminal Court was hit by what it called "anomalous activity" regarding its IT systems and that it was currently responding to this "cybersecurity incident." The post ‘Cybersecurity Incident’ Hits ICC appeared first ...

npm packages caught exfiltrating Kubernetes config, SSH keys

The Sonatype Security Research team is currently tracking an ongoing campaign on the npm registry that uses npm packages to retrieve and exfiltrate your Kubernetes configuration and SSH keys to an external server. The post npm packages caught ...

Open Systems OT Firewall monitors traffic and detects threats

Open Systems introduced OT firewall service to secure critical infrastructures. The Open Systems OT Firewall provides organizations with a dedicated appliance at the center of operational technology (OT) networks for better visibility and control ...

Exploring SEC’s Cybersecurity Rules – Material Cybersecurity Incident (Part 3)

In today's digitally driven world, where cyber threats are becoming increasingly sophisticated and prevalent, organizations must prioritize robust cybersecurity management and transparent incident disclosure practices. The new SEC Cybersecurity ...

How Security Leaders Think about Data Security Governance

At Cyral, we pride ourselves on working closely with security leaders to see the world as they see it. We conducted multiple interviews and surveys … The post How Security Leaders Think about Data Security Governance appeared first on ...

Clorox Blames Damaging Cyberattack for Product Shortage

Clorox says the recent cyberattack has been contained, but production is still not fully restored and there is a short supply of products.  The post Clorox Blames Damaging Cyberattack for Product Shortage appeared first on SecurityWeek.

Google: Chromebooks Will Get 10 Years of Software, Security Updates

Google next year will begin providing 10 years of automatic security and other software updates for Chromebooks in a move that addresses cyber concerns in the education sector and larger criticism that the popular low-priced systems needed to be ...

OT Attack Path Analysis: A Comprehensive Guide

The convergence of Information technology (IT) and Operational technology (OT) networks, resulting in the exposure of OT networks to threats, paved the way for OT cybersecurity. OT is the use of hardware and software in critical infrastructure ...

Fairwinds Insights: Kyverno Integration, Consolidated Recommendations, Release Notes & Office Hours

This month we have lots to update on, including an integration with Kyverno, how we are reducing cognitive load by consolidating resource recommendations, our release notes, and office hours tomorrow, Wednesday 9/19 at 2 PM ET / 11 AM PT. The ...