Application Security News and Articles


Building cyber resilience in always-on industrial environments

In this Help Net Security interview, Dr. Tim Sattler, CISO at Jungheinrich, discusses the cybersecurity risks tied to smart warehouses and industrial control systems. He explains how to maintain operational continuity while building real cyber ...

CC Signals lets you set boundaries with AI without locking down your work

Creative Commons introduced CC Signals, a new framework that helps data and content owners communicate how they want their work used by AI systems. The idea is to build a shared understanding of what’s acceptable, and to encourage more fair and ...

Building Security In: Four Essential CI/CD Pipeline Use Cases for Code Security

In today’s fast-paced software development landscape, Continuous Integration and Continuous Delivery (CI/CD) pipelines are the engine of…Continue reading on Medium »

Breaking the cycle of attack playbook reuse

Threat actors have learned an old business trick: find what works, and repeat it. Across countless cyberattacks, Bitdefender has observed adversaries consistently applying the same steps—the same techniques, the same security bypass ...

Axiad Confirm validates users before issuing certificates

Axiad launched Axiad Confirm, a new, automated identity verification solution. Axiad Confirm, integrated within the Axiad Conductor credential management system (CMS), ensures secure identity verification before issuing robust credentials like ...

Embed’s agentic security platform triages and investigates security alerts

Embed Security unveiled its agentic security platform that autonomously triages and investigates alerts, empowering detection and response teams to focus on what matters most. “Over the last 90 days of using Embed, we’ve saved ...

Kanister: Open-source data protection workflow management tool

Kanister is an open-source tool that lets domain experts define how to manage application data using blueprints that are easy to share and update. It handles the complex parts of running these tasks on Kubernetes and gives a consistent way to ...

When synthetic identity fraud looks just like a good customer

People may assume synthetic identity fraud has no victims. They believe fake identities don’t belong to real people, so no one gets hurt. But this assumption is wrong. What is synthetic identity fraud? Criminals create fake identities by ...

Most AI and SaaS apps are outside IT’s control

60% of enterprise SaaS and AI applications operate outside IT’s visibility, according to CloudEagle.ai. This surge in invisible IT is fueling a crisis in AI identity governance, leading to increased breaches, audit failures, and compliance ...

How AI is Transforming the Legal Profession

AI isn't replacing lawyers—it's liberating them from mundane tasks to focus on strategy and human connection. From transforming document review to democratizing legal expertise for small firms, artificial intelligence is reshaping how legal ...

Lessons from the Titanic: when you don’t respond to a crisis

When the RMS Titanic hit an iceberg on 15 April 1912, she set off flares and her wireless operator sent out a distress call. The RMS Carpathia responded, but by the time she arrived, the Titanic had already sunk: only those who had made it to the ...

Is Container OS Insecurity Making Your K8s Infrastructure Less Secure?

The decision to adopt a purpose-built container operating system (OS) versus maintaining a standard OS across legacy and cloud-native systems depends on your organization’s risk tolerance, compliance requirements, and visibility needs. Below is ...

Flaw in Notepad++ installer could grant attackers SYSTEM access (CVE-2025-49144)

A high-severity vulnerability (CVE-2025-49144) in the Notepad++ installer could be exploited by unprivileged users to gain SYSTEM-level privileges through insecure executable search paths. There is currently no indication that the vulnerability ...

Creating an Impenetrable Secrets Vault for Your Business

Why is the Management of Non-Human Identities and Secrets Crucial for Business Protection? Could your organization withstand a security breach? With the exponential growth, the risk of cyber threats has equally increased, making cybersecurity ...

Stability in Cybersecurity: The Role of NHIs

What Does Stability In Cybersecurity Mean? Stability in cybersecurity refers to a state where an organization’s data, applications, networks, and devices are secure and resistant to breaches, attacks, and data leaks. Achieving this stability ...

How NHIs Give You the Freedom to Choose Secure Solutions

Why is NHI Freedom Paramount in Today’s Cybersecurity Landscape? Have you ever stopped to consider how secure your network really is? With the surge in cyber threats, the need for comprehensive security management is more critical than ever. ...

Feel Supported: Integrating NHIs into Your Security Framework

Why is NHI Integration Crucial for Your Security Framework? Ever thought about how to strengthen your organization’s security and minimize risks? Cybersecurity resilience lies in integrating Non-Human Identities (NHIs) and Secrets Security ...

ADR and Runtime Security are Reshaping AppSec as the Application Layer Becomes the Prime Target | IDC Northstar Research | Contrast Security

In a new June 2025 research note, IDC highlights a major shift in how enterprises are thinking about Application Security (AppSec). The IDC Link Research Note covers Contrast Security’s Northstar release and the growing interest in Application ...

Bankers Association’s Attack on Cybersecurity Transparency

A coalition of banking industry associations, including SIFA, the American Bankers Association (ABA), Bank Policy Institute (BPI), and several other lobbying groups have made a disgraceful appeal to the SEC to eliminate the rule requiring public ...

LinuxFest Northwest: Operating System Upgrades In A High Performance Computing Environment

Author/Presenter: Joe Ryan (High Performance Computing Systems Engineer, Institute for Cyber Enabled Research (ICER) at Michigan State University Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th ...