Application Security News and Articles


Unlocking Near-Zero Downtime Patch Management With High Availability Clustering 

Using high availability (HA) clustering to test patches and updates more easily and to apply them in production environments with near-zero application downtime.  The post Unlocking Near-Zero Downtime Patch Management With High Availability ...

Securing digital products under the Cyber Resilience Act

In this Help Net Security interview, Dr. Dag Flachet, co-founder at Codific, explains what the Cyber Resilience Act (CRA) means for companies and how it compares to GDPR in terms of regulatory complexity and impact on organizations. He discusses ...

The Urgent Need for Tokenizing Personally Identifiable Information

If we want privacy, trust and resilience in our digital infrastructure, tokenization is no longer optional. It’s essential.  The post The Urgent Need for Tokenizing Personally Identifiable Information appeared first on Security Boulevard.

When ransomware strikes, what’s your move?

Should we negotiate? Should we pay? These are the questions every organization faces when cybercriminals lock their data. By the time attackers have encrypted your systems, the focus shifts from prevention to response. It’s no longer about ...

What is Vulnerability Exposure Management?

The digital world is crumbling, and conventional vulnerability management alone is not enough to defend your organization against the unannounced cyber threats. Identifying the flaws present within your organizational platforms and patching them ...

Widely available AI tools signal new era of malicious bot activity

Rise in accessible AI tools significantly lowered the barrier to entry for cyber attackers, enabling them to create and deploy malicious bots at scale, according to Thales. Automated bot traffic surpassed human-generated traffic for the first ...

New infosec products of the week: April 18, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Cyware, Entrust, PlexTrac, and Seemplicity. PlexTrac for CTEM helps security teams centralize security data PlexTrac for CTEM enables both ...

The Future of SSL Certificate Management: Adapting to Shortened Renewal Periods

The industry is evolving yet again. With the CA/Browser Forum’s recent decision to reduce the maximum SSL/TLS certificate lifecycle to 47 days by 2029, the way organizations manage their certificates is going to change significantly—and ...

Securing Cloud Data: A Relief for CFOs

Are Interactions in Your Digital Environment Truly Secure? Cybersecurity has grown beyond the protection of human accounts alone. Increasingly, the focus is on securing machine-based interactions, such as APIs and service accounts, that occur ...

How to Ensure Security in Cloud Compliance

Why is Cloud Security of Paramount Importance? It’s a well-acknowledged fact, isn’t it, that our reliance on cloud services has significantly increased in the past few years? According to data from Dell Technologies, almost every ...

Cut CAPTCHA Fatigue & Boost Conversions with Device Check

Cut CAPTCHA fatigue without compromising security. Learn how Device Check reduces friction for users while keeping bots out—silently and effectively. The post Cut CAPTCHA Fatigue & Boost Conversions with Device Check appeared first on ...

NIST’s adversarial ML guidance: 6 action items for your security team

The National Institute of Standards and Technology’s latest guidance, on how to secure artificial intelligence (AI) applications against manipulation and attacks achieved with adversarial machine learning (ML), represents a major step toward ...

BSidesLV24 – Common Ground – Security for AI Basics – Not by ChatGPT

Author/Presenter: Chloé Messdaghi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

CSP FY: A Magecart Attack That Dodges Policy—and Makes a Joke While Doing It

by Source Defense When attackers are clever enough to name their cookie “csp_f_y,” you know they’re not just exfiltrating data—they’re mocking your defenses. In a recent attack spotted by the Source Defense Cyber Research team, a ...

Colortokens Named a Visionary by EMA in the Vendor Vision 2025 Report!

We’re thrilled to announce that ColorTokens has been named a Visionary in the Enterprise Management Associates’ (EMA) Vendor Vision for RSAC 2025! Out of hundreds of cybersecurity companies exhibiting at this year’s RSA Conference, EMA has ...

Randall Munroe’s XKCD ‘The Roads Both Taken’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘The Roads Both Taken’ appeared first on Security Boulevard.

Time to Migrate from On-Prem to Cloud? What You Need to Know

Migrating from on-premises infrastructure to the cloud is an important step for any business seeking to modernize operations, improve scalability, and (potentially) reduce costs. Using Amazon Elastic Kubernetes Service (EKS), Microsoft Azure ...

How Legit Is Using Classic Economic Tools to Prevent Application Vulnerabilities

Learn more about how Legit is helping enterprises prevent vulnerabilities in their SDLCs. The post How Legit Is Using Classic Economic Tools to Prevent Application Vulnerabilities appeared first on Security Boulevard.

What to Look for in Application Security Posture Management (ASPM)

Get details on the key capabilities for an ASPM platform.  The post What to Look for in Application Security Posture Management (ASPM) appeared first on Security Boulevard.

The Alternative to Acunetix: Escape DAST

Looking for an Acunetix alternative? Discover how Escape DAST offers seamless app and API security testing, modern integrations, and scalability. The post The Alternative to Acunetix: Escape DAST appeared first on Security Boulevard.