Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The State of Application Security in Financial Services: Managing Security Debt

Application security in financial services is essential to maintaining trust, compliance, and operational resilience in a rapidly evolving digital landscape. Financial services organizations must balance innovation with holistic security controls, especially as the pressure to launch new digital solutions grows. The evidence is clear: challenges around “security debt,” unresolved flaws left in production for over a year, pose material risk to the sector.

Report: Organizations Are Struggling to Keep Up With AI-Powered Attacks

76% of organizations are struggling to keep up with the sophistication of AI-powered attacks, according to CrowdStrike’s latest State of Ransomware Survey. “Most organizations (87%) consider AI-generated social engineering tactics more convincing than traditional methods,” the report says.

Insider Risk, Ethical Walls and the Future of Data Governance in Financial Services

In the complex ecosystem of financial services, some of the greatest threats come from within. While cybersecurity for financial institutions often focuses on external threat actors, the reality is that insider risks—whether intentional or accidental—pose an equally dangerous challenge to regulatory compliance and organizational integrity.

The Human-AI Partnership: Securing the New Dual-Front of Business Risk

The integration of artificial intelligence into the modern workplace represents a paradigm shift in productivity and innovation. From desktops to mobile devices, AI agents are now deeply embedded in daily workflows, augmenting human intelligence and accelerating business processes at an unprecedented scale.

How KeeperPAM Integrates With IGA Platforms

Identity Governance and Administration (IGA) plays an important role in determining who should have access to sensitive data and when that access should be granted. While IGA sets the ground rules for privileged access, Privileged Access Management (PAM) focuses on how that access is granted, used and audited. Integrating these two systems is crucial for organizations to achieve enterprise-wide zero-trust security and least-privilege access enforcement.

How Cybercriminals are using AI - and How to Defend Against It

What happens when the dark side gets its hands on cutting-edge AI — and why might even seasoned defenders find themselves playing catch-up? Welcome back to Razorwire, where I’m joined by Oliver Rochford and Richard Cassidy to discuss how criminals are using AI, what’s actually working and how the threat landscape is changing. We explore how adversaries are using AI, what’s actually working in the wild and how professionals can prepare for the unsettling pace of change.

RBI Compliance Made Simple with AppTrana | Secure Your Banking and Payment Apps

In H1 2025, Indusface AppSec data recorded over 742 million attacks on banking and financial websites, a 51% surge from last year. 77% exploited known vulnerabilities, bots hit 95% of sites, and DDoS attacks spiked by over 500% on APIs. To counter these threats, the RBI’s Digital Payment Security Guidelines mandate stronger defenses across web apps, APIs, and data systems.

Online Games and Internet Speed: How to Match Your Connection to Your Playstyle

When it comes to online gaming, your internet speed is only part of the story. Many players obsess over their download rate, but for most games, low ping and a stable internet connection matter even more. Whether you're snipping opponents in a competitive shooter, exploring open-world RPGs with friends, or teaming up in a massive MMO, your network's performance can mean the difference between your victory and your defeat.

Step-by-Step: Producing a Staff Training Book for Phishing Awareness Workshops

Nowadays, with the development of technology, more teams are operating remotely. Companies have realized that it's important that these teams also get some kind of cybersecurity training. Data breaches happen often and no company wants its private data leaking and being out in the world. Seeing your team recognize and report a phishing email with confidence is what every IT security department aims for. When your training materials are finally ready and employees are actively using them, you realize that you've created something that strengthens your organization's awareness and preparedness.