Application Security News and Articles


Tech Industry Leaders Endorse Regulating Artificial Intelligence at Rare Summit in Washington

Tech executives discussed the idea of government regulations for artificial intelligence (AI) at an unusual closed-door meeting in the U.S. Senate on September 13th. The post Tech Industry Leaders Endorse Regulating Artificial Intelligence at ...

FBI Hacker Dropped Stolen Airbus Data on 9/11

In December 2022, KrebsOnSecurity broke the news that a cybercriminal using the handle "USDoD" had infiltrated the FBI's vetted information sharing network InfraGard, and was selling the contact information for all 80,000 members. The FBI ...

Security by Design and Default – How to Address the Cybersecurity Challenge

Published: August 15, 2023 at 06:09 am By Baan Alsinawi, Managing Director, Strategy and Risk, CISO Global, and Founder of TalaTek, a CISO Global company All anyone wants to talk about these days is AI, and when seven leading U.S. producers of ...

New Paper: “Securing AI: Similar or Different?“

As you may have noticed, we have released a new paper on securing AI. I want to share a few additional things here on top our official launch blog. src: https://bit.ly/ociso-ai1-pod For a few years (so, yes, I did start before the ChatGPT ...

Data Security in MySQL is an evolving compliance and threat landscape

MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only for those who purchase and use the enterprise edition. Even then, the data protection ...

BSides Buffalo 2023 – Stephen Mitchell – Building A Security Data Infrastructure

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. Permalink The post BSides Buffalo 2023 – Stephen Mitchell – Building A Security ...

How to strengthen cloud security with Zero Trust

If you’re familiar with the Zero Trust framework, its principles may seem simple enough in... The post How to strengthen cloud security with Zero Trust appeared first on Entrust Blog. The post How to strengthen cloud security with Zero Trust ...

CISO Global Threat Informed captures and analyzes data posted to darknets

CISO Global is expanding its capabilities by deepening its threat intelligence feed and incorporating it into existing services. Named ‘Threat Informed’, this new data stream mines the DarkNet, an overlay of secret networks comprised ...

AuthMind Scores $8.5M Seed Funding for ITDR Tech

Maryland startup scores $8.5 million in seed-stage funding to compete in the Identity Threat Detection and Response (ITDR) category. The post AuthMind Scores $8.5M Seed Funding for ITDR Tech appeared first on SecurityWeek.

Black Hat Fireside Chat: The impactful role crowdsourced security intelligence must play

From Kickstarter to Wikipedia, crowdsourcing has become a part of everyday life. Sharing intel for a greater good Now one distinctive type of crowdsourcing — ethical hacking – is positioned to become a much more impactful component of ...

SentinelOne releases Singularity RemoteOps Forensics to improve incident response for companies

Cyber breaches are on the rise, and when it comes to responding to them, time is of the essence. In order to drive swift conclusions, security teams need to identify relevant insights and extract actionable intelligence. It’s a daunting task, ...

Patch EVERYTHING: Widely Used ‘WebP’ Code has Critical Bug

WebP FAIL. Critical vuln in libwebp: Go get updates to Chrome, Firefox, Edge, Slack and more. The post Patch EVERYTHING: Widely Used ‘WebP’ Code has Critical Bug appeared first on Security Boulevard.

Torii launches generative AI-powered SaaS Management Platform

Torii has introduced its next generation SaaS Management Platform (SMP), featuring a series of product releases that set a new standard for innovation and extensibility in SMPs. The only SMP powered by generative AI, Torii’s enhanced platform ...

Randall Munroe’s XKCD ‘Brassica’

via the comic artistry and dry wit of Randall Munroe, maker of XKCD! Permalink The post Randall Munroe’s XKCD ‘Brassica’ appeared first on Security Boulevard.

Armis Centrix delivers a modular approach to cyber exposure management

Armis has launched Armis Centrix, the AI-powered cyber exposure management platform. Armis Centrix is a seamless, frictionless, cloud-based platform that proactively secures all your assets, remediates vulnerabilities, blocks threats and protects ...

The Enterprise Market Shift to Network Defense Platform

Martin Roesch discusses how Netography pioneered the creation of a Network Defense Platform (NDP) as a way to address these changes and created a new approach to network monitoring and security, bringing everything from your entire network into a ...

HCL BigFix 11 accelerates endpoint management strategies for organizations

HCLSoftware launched HCL BigFix 11 featuring Gen AI integration for secure infrastructure and operations automation. With its hybrid multi-cloud offering, HCL BigFix enables the seamless integration of intelligent automation as a plug-and-play ...

Averting Catastrophe: How Votiro Cloud Shielded ALYN Hospital from a Potentially Devastating Attack

Every cyberattack is a disaster in its own way, but cyber threats that disrupt the critical services provided by healthcare facilities are especially dangerous. ALYN Woldenberg Family Hospital, a rehabilitation center dedicated to physically ...

IoT and the supply chain: The road to securing devices

The post IoT and the supply chain: The road to securing devices appeared first on Security Boulevard.

SCYTHE 4.0 empowers team collaboration in real-world adversarial campaigns

SCYTHE has unveiled its latest version of the SCYTHE Core platform, introducing a number of new features designed to provide essential insight into the exploitability, impact, and prioritization of threats. SCYTHE 4.0 introduces dual-deployment ...