Application Security News and Articles


Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Partisia, Squareroot8, and NuSpace join forces in a global partnership to advance quantum-safe communications. The post Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats appeared first on ...

Critical flaws fixed in Nagios Log Server

The Nagios Security Team has fixed three critical vulnerabilities affecting popular enterprise log management and analysis platform Nagios Log Server. About the flaws The vulnerabilities, discovered and reported by security researchers Seth Kraft ...

NetRise Raises $10 Million to Grow Software Supply Chain Security Platform

The funding round brings the total amount raised by the NetRise to roughly $25 million. The post NetRise Raises $10 Million to Grow Software Supply Chain Security Platform appeared first on SecurityWeek.

Hertz Discloses Data Breach Linked to Cleo Hack

Customers of the Hertz, Thrifty, and Dollar brands had their personal information stolen as a result of the Cleo hack last year. The post Hertz Discloses Data Breach Linked to Cleo Hack appeared first on SecurityWeek.

CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe

Van Horenbeeck's career spans some of the biggest companies in tech: Verizon, Microsoft, Google, Amazon, Zendesk, and now SVP and CSO at Adobe. The post CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe ...

NSFOCUS WAF New UI Showcase: Brand New Policy and Template Management Workflow

Three-Tier Protection Rules • Basic Protection: Pre-configured, general and popular security rules for out-of-box deployment.• Optional/Advanced Protection: Advanced rules, customized for specific Web/API applications for optimum protection. ...

The Great Security Tool Consolidation: How Enterprises are Rethinking Their Security Strategy 

Security teams are increasingly abandoning the long-standing approach of deploying numerous specialized point solutions in favor of consolidated security platforms. The post The Great Security Tool Consolidation: How Enterprises are Rethinking ...

Evolution to Detective Identity Security

This week I wrote a guest article for Breez Security discussing the need for and evolution to a more detective element in our identity security landscape. Our the past two decades organisations and IAM related vendors have supported a model of ...

The Hidden Cost of Backup Recovery in Ransomware Events

Ransomware preparedness isn’t just about having backups – it’s about how quickly you can use them to recover. The post The Hidden Cost of Backup Recovery in Ransomware Events appeared first on Security Boulevard.

My Take: Is Amazon’s Alexa+ a Gutenberg moment — or a corporate rerun of history’s greatest co-opt?

Last Friday morning, April 11, I was making my way home from NTT Research’s Upgrade 2025 innovation conference in San Francisco, when it struck me that we’re at a watershed moment. I was reflecting on NTT’s newly launched Physics of … ...

Seemplicity adds AI-driven capabilities to scale remediation operations

Seemplicity announced a major product release. This latest version of the Seemplicity Platform introduces powerful new AI-driven capabilities designed to streamline and scale remediation operations. Two major new features – called ...

Top Four Considerations for Zero Trust in Critical Infrastructure

Top Four Considerations for Zero Trust in Critical Infrastructure madhav Tue, 04/15/2025 - 06:43 TL;DR Increased efficiency = increased risk. Critical infrastructure organizations are using nearly 100 SaaS apps on average and 60% of their most ...

Why shorter SSL/TLS certificate lifespans matter

Digital certificates are the unsung heroes of the internet, silently verifying that the websites, apps, and services you use are legit and your data is safe. For years, we’ve leaned on certificates with maximum validity term stretching for ...

Cybercriminal groups embrace corporate structures to scale, sustain operations

In this Help Net Security interview, Sandy Kronenberg, CEO of Netarx, discusses how cybercriminal groups are adopting corporate structures and employee incentives to scale operations, retain talent, and evade detection. He covers the strategic ...

94% of firms say pentesting is essential, but few are doing it right

Organizations are fixing less than half of all exploitable vulnerabilities, with just 21% of GenAI app flaws being resolved, according to Cobalt. Big firms take longer to fix pentest issues 94% of firms view pentesting as essential to their ...

Chief Legal Officers step up in cybersecurity oversight

In this Help Net Security video, Jennifer Chen, Executive Director of the Association of Corporate Counsel (ACC) Foundation, discusses how globally, Chief Legal Officers (CLOs) are becoming integral leaders in cybersecurity strategy, holding ...

Cybersecurity jobs available right now: April 15, 2025

CISO Department of Justice | Australia | On-site – View job details As a CISO, you will be responsible for developing and implementing a cyber security strategy as well as establishing and maintaining the organisation’s ...

Test SBX

The post Test SBX appeared first on Security Boulevard.

test-SB3

test The post test-SB3 appeared first on Security Boulevard.

Justifying Investments in Advanced IAM Technologies

Why is IAM Technology Investment Crucial? A data breach can have devastating consequences, impacting customer trust and incurring heavy financial losses. Unlike traditional password protection, the innovative non-human identities (NHIs) and ...