Application Security News and Articles


GCX launches GNSX in partnership with Palo Alto Networks

Global Cloud Xchange (GCX) has launched GNSX, a managed solution that delivers global end-to-end, zero trust hybrid networking coupled with real-time visibility, security, and control, all backed by user experience metrics and Experience Level ...

Why API Hacking is Critical to Web App Security Testing

Learn why API hacking should be an important and critical component of your web app security testing process. The post Why API Hacking is Critical to Web App Security Testing appeared first on Dana Epp's Blog. The post Why API Hacking is Critical ...

How ASPM Can Help with Software Supply Chain Security

Application security posture management (ASPM) aims to change the conversation and strategy around software supply chain security. Application portfolios are growing significantly, which is creating headaches for security teams that are ...

Wing and Drata join forces to ensure a way to keep SaaS compliant

Wing Security has partnered with Drata to integrate SaaS security controls, robust insights, and automation in order to streamline and expedite user access reviews and vendor risk assessments for compliance frameworks and standards such as SOC 2 ...

Swissbit introduces iShield Archive memory card that protects sensitive information

With ‘iShield Archive’, Swissbit introduces a new microSD card designed for encryption and access protection of video and image records, expanding the Swissbit iShield product line for plug-and-play security solutions. The card is intended ...

BSides Buffalo 2023 – Dr. Mark Gallimore, Tyler Kron-Piatek – 3D Printing Cheaply – Get Started With Free Tools For Additive Manufacturing

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. Permalink The post BSides Buffalo 2023 – Dr. Mark Gallimore, Tyler Kron-Piatek – ...

Thousands of Code Packages Vulnerable to Repojacking Attacks

Despite GitHub’s efforts to prevent repository hijacking, researchers continue finding new attack methods, and thousands of code packages. The post Thousands of Code Packages Vulnerable to Repojacking Attacks appeared first on SecurityWeek.

CTERA Vault safeguards against risks related to data tampering

CTERA unveiled CTERA Vault, Write Once, Read Many (WORM) protection technology which provides regulatory compliant storage for the CTERA Enterprise Files Services Platform. CTERA Vault aids enterprises in guaranteeing the preservation and ...

SEC Adopts New Cybersecurity Risk Management and Reporting Rules: What Businesses Need to Know

The Securities and Exchange Commission (SEC) recently adopted significant changes around cybersecurity risk management, strategy, governance, and incident disclosure requirements for public companies. The post SEC Adopts New Cybersecurity Risk ...

Gigamon Precryption technology reveals concealed threat activity in the cloud

Gigamon announced a series of cybersecurity innovations to the Gigamon Deep Observability Pipeline in its latest GigaVUE 6.4 software release. Leading the way, Gigamon Precryption technology enables IT and security organizations, for the first ...

Cyral’s Data Masking for Data Security Governance and Privacy

In the rapidly evolving landscape of data management and security, enterprises are faced with a complex challenge of ensuring comprehensive Data Security Governance (DSG) and … The post Cyral’s Data Masking for Data Security Governance and ...

The Challenges of Traditional File Integrity Monitoring

The importance of safeguarding and maintaining the integrity of your infrastructure cannot be overstated. One of the tools that organizations rely on to achieve this is File Integrity Monitoring (FIM). FIM is a crucial component of cybersecurity, ...

Vector Embeddings – Antidote to Psychotic LLMs and a Cure for Alert Fatigue?

Vector embeddings – data stored in a vector database – can be used to minimize hallucinations from a GPT-style large language model AI system (such as ChatGPT) and perform automated triaging on anomaly alerts.  The post Vector Embeddings – ...

Kasada Wins 2023 SINET16 Award for Innovation in Cybersecurity

Industry recognition for disrupting the current, static approaches to bot management. The post Kasada Wins 2023 SINET16 Award for Innovation in Cybersecurity appeared first on Security Boulevard.

Unlocking the power of generative AI in software development: Insights from Sonatype’s survey

Over the past year, generative artificial intelligence (AI) rapidly emerged as a game-changing technology, similar to the disruptive force of cloud computing in the 2000s. As often happens during the initial phases of disruptive technologies, we ...

Netcraft acquires FraudWatch to deliver online brand protection at scale

Netcraft announced the acquisition of FraudWatch, an Australian online brand protection provider focused on phishing, social media, brand infringement, and fake mobile apps. Netcraft and FraudWatch together are committed to providing global ...

Iranian Cyberspies Deployed New Backdoor to 34 Organizations

Iran-linked cyberespionage group Charming Kitten has infected at least 34 victims in Brazil, Israel, and UAE with a new backdoor. The post Iranian Cyberspies Deployed New Backdoor to 34 Organizations appeared first on SecurityWeek.

CCPA vs. GDPR: Navigating Data Privacy Regulations for SaaS Companies

Discover the main differences between the two significant consumer data privacy laws and how to navigate data privacy regulations. The post CCPA vs. GDPR: Navigating Data Privacy Regulations for SaaS Companies appeared first on Scytale. The post ...

Netography Completes Spin-Off of New Stealth Company Led by Barrett Lyon

Co-founder and Chief Architect to pursue eBPF-based innovation at new company while remaining an active advisor and board member at Netography The post Netography Completes Spin-Off of New Stealth Company Led by Barrett Lyon appeared first on ...

API Security’s Role in Protecting Retail Cloud Apps

Protection from API security threats is crucial, especially for retail companies that hold sensitive customer and financial data. The post API Security’s Role in Protecting Retail Cloud Apps appeared first on Security Boulevard.