Application Security News and Articles
Public sector organizations face rising cybersecurity, compliance, and operational challenges, especially in complex hybrid environments. Private certificate authorities (CAs) offer enhanced control, automation, and security tailored to internal ...
A leader’s guide on deploying AI agents – from selecting use cases and establishing governance, to safety controls and showing the value.
The post AI Agents in Cybersecurity: A Practical Roadmap for Leaders appeared first on Security Boulevard.
HPE announced expansion of its cybersecurity, resiliency, and compliance solutions, taking a multi-layered approach to protect enterprises through industry-leading data, network, and system security. HPE is introducing its combined secure ...
RedSeal unveiled RedSeal One, an AI-enabled exposure management platform designed to help organizations reduce risk, streamline operations, and strengthen resilience across hybrid environments. RedSeal One combines the company’s four ...
Searchlight Cyber has released a new AI capability that summarizes the activity of a threat actor in its dark web investigation platform, Cerberus. The Searchlight AI Agent uses the Cerberus’ dark web data lake to provide a quick overview of a ...
Concentric AI announced new integrations that enhance the AI-driven capabilities of its Semantic Intelligence data security governance platform, expanding data governance functionality for organizations. Concentric AI’s new integration with ...
ArmorCode announced application security and remediation advancements to help customers address risks posed by AI-generated code and applications, along with imminent compliance demands from regulations including the Cyber Resilience Act (CRA). ...
TP-Link has released the TL-WR3602BE, a high-performance Wi-Fi 7 travel router delivering speeds up to 3.6 Gbps. It features built-in VPN apps and multiple operating modes, making it a versatile choice for travel connectivity. Designed for ...
Cyber attackers are finding new ways in through the overlooked and unconventional network corners. Forescout’s 2025H1 Threat Review reveals a surge in advanced tactics, with zero-day exploits up 46 percent and ransomware attacks averaging ...
In this Help Net Security video, Kev Marriott, Senior Manager of Cyber at Immersive Labs, explores the challenges and opportunities of integrating AI into Security Operations Centers (SOCs). While AI can boost productivity by automating manual ...
Most security teams believe they can act quickly when a threat emerges. But many don’t trust the very data they rely on to do so, and that’s holding them back. A new Axonius report, based on a survey of 500 U.S.-based IT and security leaders, ...
90% of cyber leaders find managing cyber risks harder today than five years ago, mainly due to the explosion of AI and expanding attack surfaces, according to BitSight. These threats are also fueling high rates of burnout, with 47% of ...
Explore mobile push authentication protocols, including APNs and FCM, for enhanced security. Learn implementation strategies and future trends in mobile authentication.
The post Elevating Mobile Security Demystifying Push Authentication Protocols ...
Learn how to effectively manage and recover passkeys in passwordless systems. Discover best practices, fallback options, and security considerations for a secure user experience.
The post Mastering Passkey Management Safeguarding Your ...
Learn how to implement FIDO2/WebAuthn for passwordless authentication. This guide covers passkeys, security, and best practices for developers and IT professionals.
The post FIDO2 WebAuthn Powering Passwordless Authentication’s Next Wave ...
Explore Voice OTP technology, its implementation, security, and role in passwordless authentication. Learn best practices for developers in OTP as a service and CIAM.
The post Sound Security A Deep Dive into Voice OTP Technology appeared first on ...
Explore the security of OTP delivery channels like SMS, Email, and Voice. Learn about vulnerabilities and best practices for secure authentication.
The post Securing Your OTP Fortress A Deep Dive into Delivery Channel Vulnerabilities appeared ...
Learn how to optimize SMS OTP delivery for secure passwordless authentication. Improve deliverability, reduce latency, and enhance user experience with OTP services.
The post Mastering SMS OTP Delivery for Secure Authentication appeared first on ...
Explore OTP generation algorithms like TOTP and HOTP. Understand their implementation, security, and use in modern authentication systems for enhanced security.
The post Unlocking Security Mastering OTP Generation with TOTP and HOTP appeared ...
Explore secure OTP alternatives to push notifications, including SMS, email, TOTP, and passkeys. Enhance your application's authentication with robust security measures.
The post Beyond Push Notifications Exploring Robust OTP Alternatives ...