Application Security
DigiCert Survey Reveals Post-Quantum Cybersecurity Challenges
Michael Vizard | | Data Security, DigiCert, encryption, post-quantum computing, PQC, quantum computing
A DigiCert survey found most organizations unprepared to address the security implications of post-quantum computing (PQC) ...
Security Boulevard
What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security
Jeff Williams | | Article 25, Compliance, Cybersecurity, DAST, DEVOPS, Digital Operational Resilience Act, digital resilience, DORA, European Union, IAST, rasp, regulation, Regulation (EU) 2022/2554, runtime security, waf
Cyberattacks, supply-chain issues, flooding, tsunamis, wildfires, equipment failures and even war: The financial sector has no choice but to keep operations running through all these — among other — types of disruptions, ...
JumpCloud Adds Passwordless Authentication to Open Directory Platform
Michael Vizard | | Authentication, biometric, identity and access management, JumpCloud, passwordless
JumpCloud Inc. today updated its Open Directory platform to include support for a passwordless login capability, dubbed JumpCloud Go ...
Security Boulevard
Elon’s CSAM FAIL: Twitter Fined by Australian Govt.
Richi Jennings | | Australia, Australian Government, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child security online, child sexual exploitation, childpornography, CSAM, Digital Trust and Safety, Elon Musk, elon musk twitter, eSafety Commission, grooming, Julie Inman Grant, Linda Yaccarino, SB Blogwatch, trust and safety, Twitter, X
Straya strikes back: Musk’s mob declines to answer questions, breaking law dunundah ...
Security Boulevard
Microsoft Launches an AI Bug Bounty Program
As Microsoft aggressively integrates AI into its broad portfolio of products and services, the IT giant now is looking for help to ensure they are free of vulnerabilities. The company this month ...
Security Boulevard
Survey Sees Shift to Passwordless Authentication Accelerating
A survey of 1,005 IT decision-makers published today found 89% expected their organizations to use passwords for less than 25% of logins within five years ...
Security Boulevard
Build Vs. Buy: The Unknown Unknowns of FIDO-Based Passkeys
There are many unknown unknowns associated with building a FIDO-based passkey solution versus adopting off-the-shelf solutions ...
Security Boulevard
Educating the Next Cybersecurity Generation with Tib3rius
Tom Eston | | Application Security, AppSec, Bug Bounties, bug bounty, Burp Suite, career, Content Creation, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, hacker, Hacking, Information Security, Infosec, penetration tester, Penetration Testing, pentesting, Podcast, Podcasts, Privacy, security, TCM Security, technology, Tib3rius, training, Veracode, Web App Hacking, Web Application Hacking, web applications, Web Apps, Weekly Edition
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation ...
2023 OWASP Top-10 Series: Wrap Up
Over the past several months, we've taken a journey through the new 2023 OWASP API Security Top-10 list. In the previous 12 weekly posts, we've delved into each category, discussed what it ...
Stalking: Fear of Apple AirTag ‘Explodes’ — Lawsuit Momentum Grows
Richi Jennings | | AirTag, AirTags, Apple, Apple AirTag, cyberstalking, Digital Stalking, Find My iPhone, SB Blogwatch, Stalkerware, Stalking, Stalkware, Tracker Detect, trackers
This is why we can’t have nice things: 38 victims of Apple’s “negligence” named in amended class action ...
Security Boulevard