Application Security News and Articles


Armis Centrix delivers a modular approach to cyber exposure management

Armis has launched Armis Centrix, the AI-powered cyber exposure management platform. Armis Centrix is a seamless, frictionless, cloud-based platform that proactively secures all your assets, remediates vulnerabilities, blocks threats and protects ...

The Enterprise Market Shift to Network Defense Platform

Martin Roesch discusses how Netography pioneered the creation of a Network Defense Platform (NDP) as a way to address these changes and created a new approach to network monitoring and security, bringing everything from your entire network into a ...

HCL BigFix 11 accelerates endpoint management strategies for organizations

HCLSoftware launched HCL BigFix 11 featuring Gen AI integration for secure infrastructure and operations automation. With its hybrid multi-cloud offering, HCL BigFix enables the seamless integration of intelligent automation as a plug-and-play ...

Averting Catastrophe: How Votiro Cloud Shielded ALYN Hospital from a Potentially Devastating Attack

Every cyberattack is a disaster in its own way, but cyber threats that disrupt the critical services provided by healthcare facilities are especially dangerous. ALYN Woldenberg Family Hospital, a rehabilitation center dedicated to physically ...

IoT and the supply chain: The road to securing devices

The post IoT and the supply chain: The road to securing devices appeared first on Security Boulevard.

SCYTHE 4.0 empowers team collaboration in real-world adversarial campaigns

SCYTHE has unveiled its latest version of the SCYTHE Core platform, introducing a number of new features designed to provide essential insight into the exploitability, impact, and prioritization of threats. SCYTHE 4.0 introduces dual-deployment ...

Hyperview Integrates Digitalor for Rack-Unit RFID Asset Tracking and Environmental Sensors

The integrated offering gives Hyperview users an automated and cost-effective asset tracking option for data centers of all sizes Vancouver, BC—September 13, 2023— Hyperview, a leading cloud-based data center infrastructure management ...

Skybox Security announces platform enhancements to mitigate cyber exposure risk

Skybox Security announced the next generation of its Continuous Exposure Management Platform. This 13.0 release introduces significant advancements to its Attack Surface and Vulnerability Management solutions, revolutionizing how enterprises ...

BSides Buffalo 2023 – Taylor Kaufman, CISSP – “I Make Them Good Processes Go Bad” Deep Dive On LOLbins & GTFObins

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. The post BSides Buffalo 2023 – Taylor Kaufman, CISSP – “I Make Them Good ...

CISA Put Securing Open Source Software on the Roadmap

The government’s top cybersecurity agency is laying out steps it says are necessary to ensure that open source software, which is increasingly ubiquitous in modern IT environments, is secure. The eight-page document released this week by the ...

Cisco Secure Application provides business risk insights for cloud native apps

Cisco has unveiled Cisco Secure Application (previously Security Insights for Cloud Native Application Observability) on the Cisco Full-Stack Observability Platform, enabling organizations to bring together application and security teams to ...

Distributed Energy Resources Get Cybersecurity Boost with $39M DOE Funding

The US Department of Energy gives $39 million in funding for nine projects to advance the cybersecurity of distributed energy resources. The post Distributed Energy Resources Get Cybersecurity Boost with $39M DOE Funding appeared first on ...

CISOs and Board Reporting – an Ongoing Problem

Boards often complain they receive overly-technical reports from management teams that fail to put governance in business and financial terms. The post CISOs and Board Reporting – an Ongoing Problem appeared first on SecurityWeek.

US Agencies Publish Cybersecurity Report on Deepfake Threats

CISA, FBI and NSA have published a cybersecurity report on deepfakes and recommendations for identifying and responding to such threats. The post US Agencies Publish Cybersecurity Report on Deepfake Threats appeared first on SecurityWeek.

Mirantis Kubernetes Engine 3.7.0 minimizes the risk associated with updates

Mirantis released Mirantis Kubernetes Engine (MKE) 3.7.0, that adds an automatic rollback feature along with fine-grained observability of components, which ensure maximum uptime and high performance, as part of Mirantis’ ZeroOps approach to ...

Three Persistent Data Security Challenges Orgs Need to Address

Here are three of the top data security challenges that organizations face today and advice for mitigating them. The post Three Persistent Data Security Challenges Orgs Need to Address appeared first on Security Boulevard.

How Next-Gen Threats Are Taking a Page From APTs

Cybercriminals are increasingly trying to find ways to get around security, detection, intelligence and controls as APTs start to merge with conventional cybercrime. The post How Next-Gen Threats Are Taking a Page From APTs appeared first on ...

Salesforce and Google join forces to drive productivity with AI

Salesforce and Google have expanded their strategic partnership to bring together Salesforce and Google Workspace to drive productivity with AI. This partnership will deliver new bidirectional integrations that allow customers to bring together ...

CISA Releases Open Source Software Security Roadmap

CISA details its plan to support the open source software ecosystem and secure the use of open source software within the federal government. The post CISA Releases Open Source Software Security Roadmap appeared first on SecurityWeek.

How MSPs Can Begin Prioritizing Top Attack Surface Use Cases

Businesses are increasingly seeking MSP partnerships. Learn how Cavelo addresses top attack surface use cases, minimizes risk, fosters differentiation and grows revenue. The post How MSPs Can Begin Prioritizing Top Attack Surface Use Cases ...