Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » application security

Articles Tagged with ''application security''

Computer screen with coding in colored text

LectureNotes Learning App breach affects over 2 million users

Security Staff
February 13, 2024

Millions of users of the LectureNotes Learning App have had their sensitive information leaked in this data breach. 


Read More
green code on computer screen

Downtime cost of an application DDoS attack averages $6130 per minute

Security Staff
November 10, 2023

A new report highlights downtime due to a successful application DDoS attack costs organizations an average of $6,130 per minute. 


Read More
green and pink pyramid on blue screen

70% of security leaders see software supply chain as top blind spot

Security Staff
November 6, 2023

According to a cloud native security report by Venafi, 87% percent of security and IT leaders have started moving legacy applications to the cloud.


Read More
blue street sign that says personal banking

18% of African banking apps have vulnerable high severity secrets

Security Staff
October 13, 2023

The security of African financial service applications were analyzed in a recent report by Approov, finding sensitive data was left vulnerable.


Read More
phone open to apps on home screen

Vulnerability management for an appsec world

Rickard Carlsson
October 13, 2023

The problem with common vulnerability and exposure lists, however, is that the vulnerabilities being generated in modern applications aren’t known.


Read More
white keyboard

81% of security leaders say that API security is a higher priority

Security Staff
October 3, 2023

According to a recent Noname Security report, API security is more of a priority for 81% of security leaders than it was 12 months ago.


Read More
phone open to home screen

Gaming and financial service applications most likely to be attacked

Security Staff
September 19, 2023

According to a report, 57% of monitored applications are under attack with no correlation between app popularity and likelihood of being attacked.


Read More
API-related breach

The Importance of APIs

September 13, 2023

Recent studies have raised concerns about the vulnerability of smart buildings, whose seamless operation relies on application program interfaces (APIs).


Read More
laptop keyboard with white lights

Malicious web application transactions increased by 500% in 2023

Security Staff
August 24, 2023

According to a Radware cyberattack report, the number of malicious web application transactions increased by 500% compared to the first half of 2022.


Read More
hacker-in-hoodie.jpg

Understanding how hackers find their way in application supply chain

Uris-headshot
Uri Dorot
August 22, 2023

The application supply chain represents one of the latest and most serious vulnerabilities that hackers are targeting.


Read More
Previous 1 2 3 4 5 6 7 8 9 10 11 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing