Application Security News and Articles


Ten Ways Organizations Can Fill the Cybersecurity Skills Gap

The cybersecurity skills gap is throttling recruitment, but organizations can make plans and get the best of the latest crop of recruits  Cybersecurity menaces have multiplied in recent years, as we know all too well, growing in complexity and ...

Internal Controls and Segregation of Duties

Exploring Internal Controls and Segregation of DutiesMaintaining trust and safeguarding your organization's assets is a constant challenge in the intricate web of modern business processes and systems. As organizations grow in size and ...

GUEST ESSAY: Robust data management can prevent theft, guard intellectual property

In an era of global economic uncertainty, fraud levels tend to surge, bringing to light the critical issue of intellectual property (IP) theft. Related: Neutralizing insider threats This pervasive problem extends beyond traditional notions of ...

In Memoriam: 9/11 Victims

The post In Memoriam: 9/11 Victims appeared first on Security Boulevard.

System Development Life Cycle Guide

The System Development Life Cycle (SDLC) is a project management model used to guide the development of software and information systems…Continue reading on Medium »

CISOs and board members work more closely than ever before

73% of board members believe they face the risk of a major cyber attack in the next 12 months, a notable increase from 65% in 2022, according to Proofpoint. Likewise, 53% feel unprepared to cope with a targeted attack, up from 47% the previous ...

The blueprint for a highly effective EASM solution

In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should ...

Empowering consumer privacy with network security

Every online interaction hinges on the bedrock of network security. With cyber threats and data breaches making headlines daily, businesses must understand how network security safeguards consumer privacy. In this Help Net Security video, Shawn ...

Email forwarding flaws enable attackers to impersonate high-profile domains

Sending an email with a forged address is easier than previously thought, due to flaws in the process that allows email forwarding, according to a research team led by computer scientists at the University of California San Diego. The issues ...

The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15

In this episode we discuss the FBI’s remarkable takedown of the Qakbot botnet, a saga involving ransomware, cryptocurrency, and the FBI pushing an uninstaller to thousands of victim PCs. Next, we explore how a major U.S. energy organization ...

Elevating API security to reinforce cyber defense

While APIs are essential to many operations and used extensively, a lack of prioritization and understanding is leading us towards a growing API security crisis, according to a report by Traceable AI and Ponemon Institute. The urgency for API ...

Understanding the dangers of social engineering

Social engineering is a manipulative technique used by individuals or groups to deceive or manipulate others into divulging confidential or sensitive information, performing actions, or making decisions that are not in their best interest. It ...

Powerful Ethnic Militia in Myanmar Repatriates 1,200 Chinese Suspected of Involvement in Cybercrime

One of Myanmar’s biggest and most powerful ethnic minority militias arrested and repatriated more than 1,200 Chinese nationals allegedly involved in criminal online scam operations. The post Powerful Ethnic Militia in Myanmar Repatriates 1,200 ...

BSides Buffalo 2023 – Jonathan D. Lawrence – Digital Possibilities For Research And Communication In The Humanities

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. Permalink The post BSides Buffalo 2023 – Jonathan D. Lawrence – Digital ...

Week in review: 6 free resources for getting started in cybersecurity, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The misconceptions preventing wider adoption of digital signatures In this Help Net Security interview, Thorsten Hau, CEO at fidentity, ...

BSides Buffalo 2023 – Brent Patterson – Creative Hacking With Blender

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. Permalink The post BSides Buffalo 2023 – Brent Patterson – Creative Hacking With ...

2023 OWASP Top-10 Series: API7:2023 Server Side Request Forgery

Welcome to the 8th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. This post will focus on API7:2023 Server Side Request Forgery (SSRF). In this series we are taking an ...

Foliage 2023

The days are getting shorter and when we were visiting Down East Maine the other week, there was just a hint of some trees starting to change up their leaf palettes. It was a solid reminder to re-up my ~annual “foliage” plotting that I ...

Code Security Scan With Microsoft Security DevOps

Microsoft’s Security DevOps solution is a command-line application designed to seamlessly integrate static analysis tools into your…Continue reading on Medium »

Hidden costs of a legacy identity provider (IDP)

Why it’s time to move on from outdated systems The modern digital landscape is expanding and transforming at breakneck speed. As a result, the tools we rely on to secure and navigate this complex world of transformation are more critical than ...