Application Security

Application Security

cloud file service

AI Helps Security Teams, But Boosts Threats 

Industrial control systems, application containers, and mobile devices are the top contenders on this year's list of the most difficult assets to secure ...
Security Boulevard

Five Key Takeaways from the 2024 Imperva Bad Bot Report

Bad bots continue to affect consumers and organizations across all sectors. For over eleven years, Imperva has been dedicated to helping organizations manage and mitigate the threat of bad bots. We’ve published ...

Linux Backdoor Infection Scare, Massive Social Security Number Heist

In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained ...
Seal of the Cybersecurity & Infrastructure Security Agency

Sisense Hacked: CISA Warns Customers at Risk

A hard-coded credential catastrophe: The analytics firm kept big companies’ secrets in an insecure AWS bucket. Government says victims include the “critical infrastructure sector.” ...
Security Boulevard
Are custom security tests a product security superpower? ⎜Keshav Malik (LinkedIn)

Are custom security tests a product security superpower? ⎜Keshav Malik (LinkedIn)

Learn from our interview with Keshav how to better write your custom security tests and why they're necessary for your Product Security Program ...
How to secure cloud-native applications

How to secure cloud-native applications

This article is based on the Elephant in AppSec podcast episode with Mihir Shah, a Senior Staff Application Security Engineer at ForgeRock, and the author of the Cloud Native Software Security Handbook ...
How to Address API Sprawl: The Challenges and Opportunities of API Governance

The challenges and opportunities of API governance

Learn more about the concept of API sprawl, its implications, and the challenges and importance of API governance ...

Unlocking the Power of Data-Centric SAP Security: A Look at Pathlock CAC Through Kuppinger Cole’s Lens

Last month, Kuppinger Cole, a globally recognized analyst organization, took a closer look at Pathlock’s Cybersecurity Application Controls (CAC) product in a detailed Executive View report. Known for their impartial and thorough ...
A person standing in a field, but with a TV for a head

Watch This? Patch This! LG Fixes Smart TV Vulns

4×CVE=RCE or Merely CE? Update your LG TV now, or let hackers root it. But is Bitdefender overhyping the issue? ...
Security Boulevard