brandpostSponsored by Wing SecurityThis new SaaS security solution aims to disrupt the market with its ‘freemium’ approachBasic yet fundamental SaaS security is now available in a freemium model users can self-onboard, gain immediate value for free and then pay for unlocking additional important security features. By Wing Security06 Nov 20235 minsApplication Security feature The CSO guide to top security conferencesBy CSO Staff03 Nov 20239 minsTechnology IndustryIT SkillsEventsnews Microsoft pledges cybersecurity overhaul to protect products and servicesBy Michael Hill02 Nov 20239 minsInternet SecurityApplication SecurityNetwork Security newsBackSlash’s new ASPM combines existing AppSec with context-based risk prioritizationBy Shweta Sharma 01 Nov 20233 minsApplication Security newsFailure to verify OAuth tokens enables account takeover on websitesBy Lucian Constantin 27 Oct 20237 minsAuthenticationApplication SecuritySecurity Practices feature6 most common types of software supply chain attacks explainedBy Ax Sharma 25 Oct 202315 minsCyberattacksSupply ChainApplication Security featureStopping the two-factor threat: configuring Microsoft Entra ID to prevent authentication breachesBy Susan Bradley 17 Oct 20236 minsMulti-factor AuthenticationMulti-factor AuthenticationMulti-factor Authentication newsFIDO Alliance certifies security of edge nodes, IoT devices By Michael Hill 27 Sep 20233 minsCertificationsInternet SecuritySecurity Hardware news analysisWeb app, API attacks surge as cybercriminals target financial servicesBy Michael Hill 27 Sep 20236 minsFinancial Services IndustryCyberattacksApplication Security ArticlesnewsThe top new cybersecurity products at Black Hat USA 2023Here are the top cybersecurity tools, platforms, capabilities, services, and technologies launched at Black Hat USA 2023 that you need to know about.By Shweta Sharma 09 Aug 2023 8 minsEmail SecurityThreat and Vulnerability ManagementApplication SecuritynewsCode42’s Incydr identifies source and destination of source code The SaaS solution has been updated to better detect propriety source code movement.By Samira Sarraf 08 Aug 2023 3 minsDevSecOpsApplication SecuritynewsAkamai unveils API Security solution to stop API attacks, detect abuseThe solution works with any API gateway, WAAP, or cloud implementation and features a managed threat hunting service.By Michael Hill 02 Aug 2023 3 minsThreat and Vulnerability ManagementApplication SecurityAPIsnewsVast majority of organizations are no longer vulnerable to MOVEitOrganizations are remediating MOVEit vulnerabilities 21 times faster compared to other vulnerabilities, according to research by Bitsight. By Apurva Venkat 24 Jul 2023 4 minsApplication SecurityVulnerabilitiesfeatureWhy API attacks are increasing and how to avoid themGrowing use of APIs give attackers more ways to break authentication controls, exfiltrate data, or perform disruptive acts.By Maria Korolov 24 Jul 2023 20 minsApplication SecurityData and Information SecurityVulnerabilitiesnewsChainguard adds automated SBOMs, vulnerability scanning to Enforce With the added features, Enforce can now generate and ingest software bills of materials for container images, automate vulnerability scans and generate reports. By Shweta Sharma 19 Jul 2023 3 minsApplication SecuritynewsJFrog adds new DevOps capability for vetting external packagesJFrog Curation vets and blocks infected open source or third-party packages before they enter development.By Shweta Sharma 12 Jul 2023 3 minsApplication SecurityDevopsnewsEvolving web applications raise security concerns, push budgetsOPSWAT study found about three-fourths of organizations pushing their security budgets over evolving applications with unsecured infrastructure.By Shweta Sharma 12 Jul 2023 3 minsCSO and CISOApplication Securitynews analysisMost popular generative AI projects on GitHub are the least secureResearchers use the OpenSSF Scorecard to measure the security of the 50 most popular generative AI large language model projects on GitHub.By Michael Hill 28 Jun 2023 5 minsGenerative AIApplication SecurityOpen Sourcenews analysisFileless attacks surge as cybercriminals evade cloud security defensesThreat actors are concealing campaigns to evade detection and establish stronger footholds in compromised systems.By Michael Hill 27 Jun 2023 5 minsCyberattacksSupply ChainApplication SecuritynewsBaffle launches new user interface to simplify application data securityBaffle Manager 2.0 adds REST APIs, secrets store, certificate store, and SSO to fully automate data protection over SaaS workflows.By Shweta Sharma 21 Jun 2023 3 minsApplication SecurityData and Information SecuritySecurity SoftwarenewsTeam Cymru launches threat-hunting tool aims to fast-forward analysisThe new scouting tool for threat hunting and malicious infrastructure analysis promises to level up users’ security operation centers.By Samira Sarraf 19 Jun 2023 2 minsThreat and Vulnerability ManagementApplication SecurityData and Information Security Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Video on demand videoWhat's ahead for cybersecurity in 2019: TECH(talk)J.M. Porup, senior writer at CSO online, joins Juliet on this week’s episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles. 01 Feb 2019 25 minsRansomwareTechnology IndustryCyberattacks 6 security reasons to upgrade to Windows 10 25 Jul 2018 1 minsApplication SecurityPrivacyWindows Don't ignore application security | Salted Hash Ep 35 23 Jul 2018 18 minsApplication SecurityVulnerabilitiesSecurity The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34 03 Jul 2018 16 minsData BreachApplication SecurityCybercrime See all videos Explore a topic Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How a digital design firm navigated its SOC 2 audit By Alex Levin 28 Nov 202311 mins CertificationsCompliance news GE investigates alleged data breach into confidential projects: Report By Shweta Sharma 27 Nov 20233 mins Data Breach opinion A year after ChatGPT’s debut, is GenAI a boon or the bane of the CISO’s existence? By Christopher Burgess 27 Nov 20236 mins Generative AIData and Information SecuritySecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO