Application Security News and Articles


Active Scanning vs. Passive Scanning: Key Differences

Enterprise security teams are stretched thin, and the attack surface keeps growing. The harsh truth? If you’re not scanning for vulnerabilities, you’re not seeing the full picture. And if you’re... The post Active Scanning vs. Passive ...

Building Trust in Your NHI Security Measures

How Reliable are Your Non-Human Identity Security Measures? Have you ever questioned the trustworthiness of your Non-Human Identity (NHI) security measures? With the increasing adoption of NHIs, due to the cloud’s efficiency and scalability, ...

Effective NHI Management that Fits Your Budget

Why is Budget-Friendly NHI Management Crucial for Business Success? Effective cybersecurity is no longer a luxury but a necessity for businesses across different industries. The question is: How can organizations ensure robust cybersecurity that ...

Is Your Secrets Management Getting Better?

Are Your Cybersecurity Strategies Evolving Effectively? The question arises: Is your secrets management improving? These days, robust secrets management isn’t a luxury but a necessity, especially for businesses dealing with cloud technology. ...

AI Assistant

Product Update: Version 5.0 We’ve rolled out our biggest update yet, and it’s packed with lots of great stuff that make managing your data center even easier, smarter, and more efficient. Here's a quick look at what’s new. AI Assistant, ...

LinuxFest Northwest: CentOS Mythbusters

Author/Presenter: Carl George (Principal Software Engineer, Red Hat) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their ...

How To Block Apps On Any Device [2025 Guide]

In school environments, blocking apps is necessary. Not only to keep students productive and engaged in the classroom, but also to ensure safety. Certain apps simply take a student’s focus; others expose them to inappropriate content and ...

Who is Hero?

The post Who is Hero? appeared first on AI Security Automation. The post Who is Hero? appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Interoperability’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Interoperability’ appeared first on Security Boulevard.

Operationalizing the OWASP AI Testing Guide with GitGuardian: Building Secure AI Foundations Through NHI Governance

Align your AI pipelines with OWASP AI Testing principles using GitGuardian’s identity-based insights to monitor, enforce, and audit secrets and token usage. The post Operationalizing the OWASP AI Testing Guide with GitGuardian: Building Secure ...

Bipartisan Bill Aims to Block Chinese AI From Federal Agencies

The proposal seeks to ban all use of the technology in the U.S. government, with exceptions for use in research and counterterrorism efforts. The post Bipartisan Bill Aims to Block Chinese AI From Federal Agencies appeared first on SecurityWeek.

Securing AI code at the source: Mend.io now integrates with Cursor AI Code Editor

Mend.io now integrates with Cursor to secure AI-generated code in real time The post Securing AI code at the source: Mend.io now integrates with Cursor AI Code Editor appeared first on Security Boulevard.

Is PCI DSS 4.0 Slowing You Down? Here’s How comforte Can Accelerate Your PCI Compliance Journey

With the latest version of PCI DSS, the Payment Card Industry Security Standards Council (PCI SSC) aims to elevate the standards for cardholder data (CHD) security with themes like stronger cryptography, multi-factor authentication, and ...

Microsegmentation: The Must-Have Cyber Defense in 2025

The Perimeter Is Gone – But Your Attack Surface Keeps Growing Cloud workloads, SaaS apps, edge devices, third-party APIs, and a permanently remote workforce have dissolved the neat network perimeter we once relied on. Traditional firewalls, ...

Managing Strobes Agents for Internal Scanning

Security coverage often ends where network visibility drops — inside restricted environments, air-gapped systems, or cloud-isolated virtual networks. Standard external scanners are blind to these zones, creating blind spots that... The post ...

LinuxFest Northwest: My Journey Using Linux From Scratch And Why You Should Try It Too

Author/Presenter: Nathaniel Smith (Bellevue College, Baccalaureate Program Undergraduate In Computer Science) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the ...

Dispersive Earns Prestigious “Deployed on AWS” Badge

From the Desk of Don Leone, Vice President of Sales, Strategic Alliances There are milestones in the life of a cybersecurity company that speak volumes, not just about where we’ve been, but where we are headed. Today, I’m thrilled to share ...

Security Without Guesswork: Calculating and Reducing Residual Risk

We’re staunch believers in the adage: The post Security Without Guesswork: Calculating and Reducing Residual Risk appeared first on Security Boulevard.

Australia’s 28-Day Cyber Comeback

Australian and New Zealand companies are bouncing back from cyberattacks nearly three weeks faster than they did a year ago, according to a new survey commissioned by U.S. data-protection vendor Commvault and published by Reuters. The poll of 408 ...

The Toxic Cloud Trilogy: Why Your Workloads Are a Ticking Time Bomb

Don’t let hidden cloud risks become tomorrow’s headline breach. The time to dismantle the toxic cloud trilogy is now. Here’s how Tenable Cloud Security can help. In today’s cloud environments, individual misconfigurations or ...