Application Security News and Articles


From Secure Access to Smart Interactions: Using Weather APIs in SaaS Platforms

Learn how integrating weather APIs into authenticated SaaS apps enhances user engagement with contextual, real-time experiences. The post From Secure Access to Smart Interactions: Using Weather APIs in SaaS Platforms appeared first on Security ...

Week in review: F5 data breach, Microsoft patches three actively exploited zero-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Building a healthcare cybersecurity strategy that works In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks ...

What Secure Collaboration Looks Like in Authenticated SaaS Apps?

Learn how secure collaboration in authenticated SaaS apps preserves identity, context, and control while streamlining in-app feedback. The post What Secure Collaboration Looks Like in Authenticated SaaS Apps? appeared first on Security Boulevard.

Is Your Secrets Management Scalable?

What Are Non-Human Identities, and Why Do They Matter in Cybersecurity? Have you ever stopped to consider the role of machine identities in your organization’s security framework? The focus often drifts toward human-centric threats. However, ...

Ensuring a Safe Digital Landscape with NHIDR

What is the Role of Non-Human Identities in Securing a Safe Digital Landscape? Where organizations increasingly migrate to cloud environments, the management of Non-Human Identities (NHIs) becomes pivotal in securing a safe digital. But what ...

How Secure Are Your Non-Human Identities?

Are Non-Human Identities the Weakest Link in Your Cybersecurity Chain? Safeguarding Non-Human Identities (NHIs) is crucial for any organization striving to maintain robust security protocols. These machine identities, composed of encrypted ...

NDSS 2025 – Workshop On The Security Of Space And Satellite Systems (SpaceSec) 2025, Panel

Panelists: Ashok Prjapathi (NASA), Martin Strohmeier (Armasuisse), Stephen Schwab (USC ISI), Dan Wallach (DARPA): Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s ...

NDSS 2025 – Workshop On The Security Of Space And Satellite Systems (SpaceSec) 25, Keynote Address: NASA’s Core Flight System (cFS) 2.0 And Beyond

Author, Creator & Presenter: Dr. Ashok Prajapati (NASA) Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the ...

Static vs Dynamic Android App Pentesting: How AutoSecT Combines Both

When you build a mobile app, two kinds of risks hide inside it. One lives in the code, and the risks are hard-coded secrets, weak encryption, and forgotten debug settings. The other only appears when the app is running. The risks involved in this ...

ISO 27001 Audit Record Retention Requirements

As one of the most common information security frameworks in the world, ISO 27001 is used by tens of thousands of organizations worldwide. That means it has to fit a lot of different groups with a lot of different needs. It also means that ...

Budget-Friendly NHI Management Solutions

How Secure Are Your Machine Identities? Managing Non-Human Identities (NHIs) is crucial to ensuring robust cybersecurity. These machine identities, akin to digital tourists carrying encrypted passports, demand meticulous oversight, especially for ...

Adaptable Secrets Vaulting for Dynamic Environments

Are You Fully Optimizing Non-Human Identities in Cybersecurity? Ensuring the security and efficiency of Non-Human Identities (NHIs) is crucial. These machine identities play a pivotal role in any organization’s cybersecurity strategy, yet ...

Finding Joy in Secure Cloud Migrations

How Does Managing Non-Human Identities Contribute to Secure Cloud Migrations? A new breed of identities has emerged: Non-Human Identities (NHIs). With organizations increasingly migrate to the cloud, ensuring the security of these machine ...

5 SOC Problems Morpheus Solves (That Legacy Tools Can’t)

Morpheus automates investigations, correlates across 800+ integrations, and turns your stack into an autonomous SOC, without ripping and replacing anything. The post 5 SOC Problems Morpheus Solves (That Legacy Tools Can’t) appeared first on D3 ...

NDSS 2025 – Workshop On The Security Of Space And Satellite Systems (SpaceSec) 2025, Panel

Panelists: Ashok Prjapathi (NASA), Martin Strohmeier (Armasuisse), Stephen Schwab (USC ISI), Dan Wallach (DARPA): Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s ...

Randall Munroe’s XKCD ‘’Hiking”

via the just-in-time jocularity & water-slide wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Hiking” appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘’100% All Achievements”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’100% All Achievements” appeared first on Security Boulevard.

TDL 007 | Cyber Warriors & Digital Shadows: Insights from Canada’s Cybersecurity Leader

Summary In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the Government of Canada. With a career spanning 33 years at the Communication Security Establishment (CSE), ...

Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US

The U.S. is the top target for cyberattacks, with criminals and foreign adversaries targeting companies, governments and organizations. The post Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US appeared first on ...

OAuth for MCP – Emerging Enterprise Patterns for Agent Authorization

Why agents break the old model and require rethinking traditional OAuth patterns. The post OAuth for MCP – Emerging Enterprise Patterns for Agent Authorization appeared first on Security Boulevard.