Application Security News and Articles


What are the best governance practices for managing NHIs?

What Drives the Need for Effective Non-Human Identities (NHIs) Governance Practices? Are we really addressing the potential dangers that lurk behind poorly managed non-human identities (NHIs)? With a sharp increase in the interconnectedness of ...

How can NHIs affect our overall threat landscape?

Are We Overlooking Non-Human Identities in Our Cybersecurity Strategy? How often do we give due consideration to the Non-Human Identities (NHIs)? The role of NHIs and their ‘secrets’ management in creating a robust and secure IT ...

How do I prioritize NHI risks in boardroom discussions?

Why is Risk Prioritization of Non-Human Identities Essential in Boardroom Discussions? Cybersecurity continues to command greater attention in organizational hierarchies, understanding the significance of Non-Human Identities (NHIs) risk ...

MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark Compliance Summit

Go inside the landmark Kaseya Compliance Summit, a unique event featuring industry experts focused on compliance challenges and opportunities for small business. The post MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark ...

BSides Exeter 2024 – Keynote: Become A Better Security Engineer (By Not Doing Security)

Author/Presenter: Kane Narraway Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...

‘Ban These Chinese Routers NOW,’ Cries House Committee

Sino stoppage scheme: TP-Link in crosshairs, along with other brands. The post ‘Ban These Chinese Routers NOW,’ Cries House Committee appeared first on Security Boulevard.

Guide: What is the CMMC-AB (Accreditation Body)?

Every year that goes by shows an improvement in technology, often by leaps and bounds over previous technology. What used to be the realm of far-off science fiction so unbelievably exotic that it defined genres is now a commonplace reality. With ...

AI Governance in AppSec: The More Things Change, The More They Stay the Same

Learn how AppSec teams can extend existing security and compliance practices seamlessly to AI. The post AI Governance in AppSec: The More Things Change, The More They Stay the Same appeared first on Security Boulevard.

US Seize Garantex in Cryptocurrency Money Laundering Bust

Two men linked to Garantex are accused of facilitating multi-billion dollar money laundering and sanctions violations. The post US Seize Garantex in Cryptocurrency Money Laundering Bust appeared first on SecurityWeek.

Our Latest Product Updates: API Lifecycle Graph and Others

In addition to our bi-directional Integration with Wiz, we have more product updates for you this month! The post Our Latest Product Updates: API Lifecycle Graph and Others appeared first on Security Boulevard.

In Other News: EntrySign AMD Flaw, Massive Attack Targets ISPs, ENISA Report

Noteworthy stories that might have slipped under the radar: Google discloses AMD CPU flaw named EntrySign, ISPs in the US and China targeted in massive attack, ENISA report on NIS2 Directive. The post In Other News: EntrySign AMD Flaw, Massive ...

The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human Identities in the Age of Agentic Automation

Explore the evolution of Single Sign-On for autonomous AI agents, focusing on securing non-human identities and the future of agentic automation security. The post The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human ...

BSides Exeter 2024 – Welcome From The Directors – BSides Exeter Orga

BSides Exeter 2024 - Welcome From The Directors - BSides Exeter Orga Authors/Presenters: The BSides Exeter Directors Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought ...

Cloud security gains overshadowed by soaring storage fees

Storage fees in general (e.g., API calls, operations, data access) comprise 49% of an average user’s service bill, compared to the actual stored capacity, according to a study conducted by Vanson Bourne. Nearly all organizations globally have ...

Compensating Controls, Customized Approach and Tokenization in PCI DSS 4.0

The Payment Card Industry Data Security Standard (PCI DSS) has always been considered one of the most prescriptive industry mandates around. And well might it be, given what’s at stake. As breach volumes surge and threat actors find it ever ...

Simplifying SaaS Security with the Power of GenAI

Learn how AI is transforming SaaS security and why AI-driven security is not just an advantage to your SaaS ecosystems, but a necessity that will help redefine how critical data is protected. The post Simplifying SaaS Security with the Power of ...

Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros

Check out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how to improve job satisfaction among tech staff. Meanwhile, find out why Congress wants federal contractors to adopt vulnerability disclosure ...

FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail 

An extortion group has been sending physical mail to corporate executives, threatening to leak their data unless a ransom is paid. The post FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail  appeared first on SecurityWeek.

Microsoft Says One Million Devices Impacted by Infostealer Campaign 

Microsoft has uncovered a malvertising campaign that redirected users to information stealers hosted on GitHub. The post Microsoft Says One Million Devices Impacted by Infostealer Campaign  appeared first on SecurityWeek.