Application Security News and Articles


Why the SOC needs its “Moneyball” moment

In the classic book and later Brad Pitt movie Moneyball, the Oakland A’s didn’t beat baseball’s giants by spending more – they won by thinking differently, scouting players not through gut instinct and received wisdom, but by ...

From posture to prioritization: The shift toward unified runtime platforms

In this Help Net Security interview, Rinki Sethi, Chief Security Officer at Upwind, discusses how runtime platforms help CISOs shift from managing tools to managing risk. She encourages CISOs to position runtime as a practical layer for real-time ...

Moving Beyond Static Credentials in Cloud-Native Environments

5 min readStatic credentials, like hardcoded API keys and embedded passwords, have long been a necessary evil. But in distributed, cloud-native environments, these static credentials have become a growing source of risk, operational friction, and ...

Managing Encryption Keys vs. Access Keys

6 min readNot all keys are created equal, and treating them as if they are can quietly introduce risk. The post Managing Encryption Keys vs. Access Keys appeared first on Aembit. The post Managing Encryption Keys vs. Access Keys appeared first on ...

A Guide to Secret Remediation Best Practices

6 min readWith the increasing complexity of cloud environments and the proliferation of APIs, exposed secrets have become a widespread concern. The post A Guide to Secret Remediation Best Practices appeared first on Aembit. The post A Guide to ...

Best Practices for Secrets Management in the Cloud

5 min readThis guide covers the essential best practices for securing your organization's secrets in cloud environments. The post Best Practices for Secrets Management in the Cloud appeared first on Aembit. The post Best Practices for Secrets ...

Why should companies or organizations convert to FIDO security keys?

In this Help Net Security interview, Alexander Summerer, Head of Authentication at Swissbit, explains how FIDO security keys work, what threats they address, and why they’re gaining traction across industries, from healthcare to critical ...

Companies negotiate their way to lower ransom payments

Nearly 50% of companies paid the ransom to recover their data, the second-highest rate in six years, according to Sophos. How actual payments stack up with the initial demand Ransom payments and recovery costs are on the decline Despite the high ...

Users lack control as major AI platforms share personal info with third parties

Some of the most popular generative AI and large language model (LLM) platforms, from companies like Meta, Google, and Microsoft, are collecting sensitive data and sharing it with unknown third parties, leaving users with limited transparency and ...

Delegated Administration in Partner IAM: Best Practices

Discover Partner IAM best practices with delegated access control, B2B identity management, and how LoginRadius supports secure delegation. The post Delegated Administration in Partner IAM: Best Practices appeared first on Security Boulevard.

What Water Utilities Need to Know About HMI Security and AI Solutions

Water and Wastewater Systems are increasingly becoming soft targets for sophisticated cyber attackers. A new joint fact sheet from the EPA and CISA puts this threat front and center, warning utilities about the growing risk of internet-exposed ...

Beyond SMS OTP: Why Major Organizations Are Abandoning Text-Based Authentication

The elimination of SMS OTP from major organizations and government systems represents an inevitable evolution toward more secure, cost-effective, and user-friendly authentication approaches. Organizations that recognize this trend and act ...

Secrets Management: Free Your Team from Routine Burdens

Could Secrets Management Be the Key to Unburdening Your Teams? When we talk about potential bottlenecks and inefficiencies in business operations, the conversation often focuses on process improvement and automating repetitive tasks. Yet, we ...

LinuxFest Northwest: GNU/Linux Loves All

Author/Presenter: Timmy Barnett (GNU Philosopher) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest ...

Why Every File Demands Sanitization

The post Why Every File Demands Sanitization appeared first on Votiro. The post Why Every File Demands Sanitization appeared first on Security Boulevard.

SCIM Best Practices: Building Secure and Extensible User Provisioning

It's worth thinking about how schema design and security considerations interact with each other. The decisions you make about schema extensions can have significant security implications, and your security requirements might influence how you ...

ADR Virtual Patching Use Rising as Retail Application Layer Attacks Spike | May Attack Data | Contrast Security

One important Application Detection and Response feature is helping customers intercept real threats in real time, shielding apps while developers patch the underlying flaws. The post ADR Virtual Patching Use Rising as Retail Application Layer ...

Black Hat SEO Poisoning Search Engine Results For AI to Distribute Malware

IntroductionZscaler ThreatLabz researchers recently uncovered AI-themed websites designed to spread malware. The threat actors behind these attacks are exploiting the popularity of AI tools like ChatGPT and Luma AI. These websites are utilizing ...

WhatsApp BANNED by House Security Goons — But Why?

New phone—who dis? Office of the Chief Administrative Officer (CAO) offers hazy reasoning. The post WhatsApp BANNED by House Security Goons — But Why? appeared first on Security Boulevard.

Anton’s Security Blog Quarterly Q2 2025

Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Top 10 posts with the most ...