Application Security News and Articles


Generative AI & Trust: A Paradigm Shift in Security

Generative AI, which includes models like GPT-3 and its successors, is changing the way people create, consume, and interact with digital content and information. In fact, it would not be an understatement to say that this type of AI is reshaping ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #258 — The Business Are Happy

via the respected Software Engineering expertise of Mikkel Noe-Nygaard as well as the lauded Software Engineering and Enterprise Agile Coaching talent of Luxshan Ratnarav at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...

Diligent One allows users to analyze and report disparate data from any information source

Diligent announced Diligent One, a platform that provides leadership, boards and practitioners with a single source for all their governance, risk and compliance (GRC) needs. Over the last six months Diligent has launched board and leadership ...

Will today’s security purchases stop tomorrow’s deadliest threats?

Future-proof your investment by determining what business and security initiatives a new tool may be able to support or streamline.  The post Will today’s security purchases stop tomorrow’s deadliest threats? appeared first on ...

Automating Kubernetes Cost Reductions

Meet Rosie & Her Architecture Cloud costs are a common pain point. We hear about it all the time from our customers, and we are … The post Automating Kubernetes Cost Reductions appeared first on Cyral. The post Automating Kubernetes Cost ...

CloudBees unveils a new DevSecOps platform

CloudBees has unveiled a new cloud native DevSecOps platform that places platform engineers and developer experience front and center. The platform is built on Tekton, uses a GitHub Actions style domain-specific language (DSL), and adds feature ...

What is Tier Zero — Part 2

What is Tier Zero — Part 2 Round 2! This is Part 2 of our webinar and blog post series Defining the Undefined: What is Tier Zero. In Part 1, we gave an introduction to the topic and explained why the reader should care. We discussed ...

A One-Two Punch for Security ROI

Cost avoidance is a powerful way to kick-off ROI discussions. However, to quickly move beyond objections, shifting to a more tangible approach to calculate ROI can help. The post A One-Two Punch for Security ROI appeared first on SecurityWeek.

Attackers hit software firm Retool to get to crypto companies and assets

Retool, the company behind the popular development platform for building internal business software, has suffered a breach that allowed attackers to access and take over accounts of 27 cloud customers, all in the crypto industry. According to a ...

CertiK launches SkyInsights to simplify crypto compliance and risk management

Designed to address the pressing crypto compliance and risk management demands of Web3 firms and stakeholders, SkyInsights emphasizes CertiK’s commitment to raising the standard of security and transparency across the industry. Coming at a ...

BSides Buffalo 2023 – Destiney M. Plaza – I Spy With My Hacker Eye – How Hackers Use Public Info To Crack Your Creds

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. Permalink The post BSides Buffalo 2023 – Destiney M. Plaza – I Spy With My Hacker ...

Microsoft’s September 2023 Patch Tuesday Addresses 2 Zero-Days, 59 Vulnerabilities

Microsoft has released its latest release of security updates for September 2023. In its most recent Patch Tuesday, the tech giant has addressed a total of 52 vulnerabilities, including two zero-day vulnerabilities actively exploited by malicious ...

Collections from a Lifetime in Protection 

Anyone who has read my memoir Ghost: Confessions of a Counterterrorism Agent (Random House, 2008) knows I grew up in the Washington, D.C. area in the 1960s and 1970s. It was a different era when blue-collar families like mine could afford to ...

Data Architectures Are Evolving but Security Remains the Top Challenge

The race for competitive advantage has not dimmed since the pandemic. Enterprise leaders view economic and business uncertainty as a given today. They are therefore looking for ways to balance the drive for more efficiency and productivity with ...

K8s Enterprise Questions: What About Security, Platform Engineering, and Distros?

As Kubernetes adoption continues to grow and enterprises increasingly deploy production workloads, we’ve seen a lot of questions. Our recent Cloud Native Now webinar with Mike Vizard, Chief Content Officer at Techstrong Group, Maz Tamadon, ...

DoD Turns to Stronger Alliances to Combat Cyberthreats

The Pentagon is undertaking a much more proactive approach to cybersecurity, with plans to more closely partner with the private sector and ally nations being a key part of an overhauled cyber strategy that is informed by the work already ...

Claroty’s VRM enhancements empower security teams to quantify CPS risk posture

Claroty announced enhancements to its SaaS platforms’ vulnerability and risk management (VRM) capabilities, further empowering security teams to evaluate and strengthen their organization’s CPS risk posture. The enhancements comprise ...

ICS Computers in Western Countries See Increasing Attacks: Report

ICS computers in the Western world have been increasingly attacked, but the percentages are still small compared to other parts of the globe.    The post ICS Computers in Western Countries See Increasing Attacks: Report appeared first on ...

AtData collaborates with Persona to strengthen fraud prevention

AtData announced its partnership with Persona, a unified identity platform that helps businesses verify their users and fight fraud. This collaboration reflects an industry that is acknowledging the pressing need for stronger defenses against a ...

Kubernetes Vulnerability Leads to Remote Code Execution

A high-severity vulnerability can be exploited to execute code remotely on any Windows endpoint within a Kubernetes cluster. The post Kubernetes Vulnerability Leads to Remote Code Execution appeared first on SecurityWeek.