Application Security News and Articles


Proactive Measures for NHI Threat Detection

What is the Critical Core of NHI Management? Non-Human Identities (NHIs), the machine identities used in cybersecurity, play an essential role in maintaining an organization’s security status. Created by combining a “Secret” (an encrypted ...

Stay Reassured with Enhanced NHI Safety

Can Enhanced NHI Safety Bring You Peace of Mind? The management of Non-Human Identities (NHIs) and Secrets has become increasingly crucial. With all the buzz around the subject, does the thought of enhanced NHI safety reassure you? Although ...

Confidence in Handling NHIs Effectively

What if there was a way to drastically reduce the security risks in your cloud environment? Imagine having the ability to identify and mitigate any risk proactively, without any hassles. It turns out that method exists, and it’s called ...

OffensiveCon25 – Skin In The Game: Survival Of GPU IOMMU Irregular Damage

Authors/Presenters: Fish and Ling Hanqin Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at ...

From Quarterbacks to CxOs: Why We All Need a Coach

At one time, having a personal coach was just for top-tier athletes, but no longer. Whether you prefer the term "mentor" or "life coach," there’s growth potential for us all to consider. The post From Quarterbacks to CxOs: Why We All Need a ...

Week in review: Google fixes exploited Chrome zero-day, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: June 2025 Patch Tuesday forecast: Second time is the charm? Microsoft has been busy releasing more out-of-band (OOB) patches than usual ...

From StackStorm to DeepTempo

And what does it tell us about Cybersecurity? As the founding CEO of StackStorm and now DeepTempo, I’ve seen how the needs of CISOs and SOCs have changed over the last 10+ years. New challenges and a better color scheme! When we started ...

Getting Started with SAST: Detecting Vulnerabilities Early with GitHub Actions

The First Step to Integrating Security into CIContinue reading on Medium »

Scalable Solutions for NHI Management

Is Your Organization Implementing Scalable Solutions for NHI Management? Is your business laying a solid groundwork for efficient Non-Human Identity (NHI) management? If not, you’re likely exposing your organization to unnecessary risks. Data ...

Boost Your Confidence with Strong NHI Management

Why Does NHI Management Matter? Imagine being able to boost your confidence, largely dependent on automated processes. What if there was a way to foster a sense of security about your organization’s data management, transparency, and regulatory ...

Driving Innovation through Secure NHIs

Are You Embracing Innovation Securely? The quest for innovation is always at the forefront. Our desire to push boundaries and create more efficient and dynamic solutions is a driving force for progress. However, amid all the technological ...

Empower Your Team with Robust NHI Protocols

How Crucial Are Robust NHI Protocols in Empowering Teams? These days, it’s a fair assumption that most businesses base a significant portion of their operations. The management of Non-Human Identities (NHIs) has become increasingly important. ...

OffensiveCon25 – No Signal, No Security: Dynamic Baseband Vulnerability Research

Authors/Presenters: Daniel Klischies and David Hirsch Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s ...

MCP (Model Context Protocol) and Its Critical Vulnerabilities

Model Context Protocol connects AI assistants to external tools and data. Think of it as a bridge between Claude, ChatGPT, or Cursor and your Gmail, databases, or file systems. Released... The post MCP (Model Context Protocol) and Its Critical ...

5 SaaS Blind Spots that Undermine HIPAA Security Safeguards

Hidden SaaS risks can quietly undermine HIPAA security safeguards. Discover how SaaS visibility and control help protect ePHI and ensure HIPAA compliance. The post 5 SaaS Blind Spots that Undermine HIPAA Security Safeguards appeared first on ...

Ensuring Certainty in NHIs Lifecycle Management

What Role does Certainty Play in the Management of NHIs Lifecycle? Where data breaches and cyber-threats pose significant risks, any security professional worth their salt knows the importance of having robust and efficient management practices. ...

Are Your Cloud NHIs Truly Protected?

Are You Doing Enough to Secure Your Cloud NHIs? Is your organization’s cloud security robust enough to protect your non-human identities (NHIs)? This is a question that has been increasingly haunting CISOs, cybersecurity professionals, and ...

Unleashing Powerful Cloud-Native Security Techniques

Is Managing Non-Human Identities the Key to Achieving Robust Cloud-Native Security? Where humans and machines square off, intent on breaching each other’s defenses. However, an important facet often goes unnoticed – Non-Human Identities ...

Why Securing NHIs Reduces Your Cyber Risk

Why is NHI Security Critical in Risk Management? Have you ever considered the potential security risk lurking? The reality is that the growing complexity of IT infrastructures, particularly in the cloud, presents new challenges for risk ...

Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead

Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead The rules of cybersecurity are shifting—again. As 2025 unfolds, companies face a paradox: digital acceleration ...