Application Security News and Articles


Adidas Data Breach Linked to Third-Party Vendor

Adidas said hackers accessed a “third-party customer service provider” and stole customer information. The post Adidas Data Breach Linked to Third-Party Vendor appeared first on SecurityWeek.

An Enterprise Playbook to Defending Against Volt Typhoon 

An identity threat detection approach built on access intelligence is key to identifying and disrupting campaigns like Volt Typhoon.  The post An Enterprise Playbook to Defending Against Volt Typhoon  appeared first on Security Boulevard.

Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management

Join the live webinar to understand why data in itself is not enough to make informed decisions for prioritization. The post Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management appeared first on SecurityWeek.

RSAC Fireside Chat: Cyber risk mitigation turns personal–defending the CEO as an attack vector

Executives are under digital siege—and most don’t even know it. Related: Shareholders sue over murder At RSAC 2025, I sat down with Chuck Randolph, SVP of Strategic Intelligence and Security at 360 Privacy, to unpack a … (more…) The post ...

Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025

Agentic AI can be a great tool for many of the ‘gray area’ tasks that SOC analysts undertake. The post Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025 appeared first on SecurityWeek.

AI Agents and APIs: Understand Complexities Today to Authenticate Tomorrow

The growth of AI agents puts the need for robust API authentication practices front and center, so today we’re highlighting two AI agent scenarios and how you could deal with their typical authentication challenges.  The post AI Agents and ...

Human Risk Management: The Next Security Challenge

Nisos Human Risk Management: The Next Security Challenge Human risk isn’t new. It’s growing faster, showing up in more places, and catching many organizations off guard... The post Human Risk Management: The Next Security Challenge appeared ...

AI is a Ticking Time Bomb for Your Data, Reveals New Report From Varonis 

A new report from Varonis examines nearly 10 billion files and suggests that AI is a ticking time bomb for your data. The post AI is a Ticking Time Bomb for Your Data, Reveals New Report From Varonis  appeared first on Security Boulevard.

Model Context Protocol (MCP) vs Agent-to-Agent (A2A)

The Future of AI Agent Communication and What It Means for Enterprise Innovation As AI agents move from concept to operational reality, the architecture behind...Read More The post Model Context Protocol (MCP) vs Agent-to-Agent (A2A) appeared ...

Resecurity Compliance Manage empowers cybersecurity leaders with AI-driven insights

Resecurity has officially launched its AI-driven Compliance Manager. The solution is engineered to help CISOs and compliance teams manage complex regulatory demands, reduce risk, and maintain alignment with global cybersecurity standards. The ...

Cisco Duo IAM protects against AI-driven identity threats

Cisco unveiled Duo Identity and Access Management (IAM), a new security solution that transforms how organizations combat persistent identity-based attacks that are accelerating in the AI era. Identity is a prime target for bad actors, accounting ...

What CISOs can learn from the frontlines of fintech cybersecurity

At Span Cyber Security Arena, I sat down with Ria Shetty, Director, Cyber Security & Resilience for Europe at Mastercard. Our conversation cut through the hype and focused on what CISOs deal with every day: how to embed security into ...

How CISOs can regain ground in the AI fraud war

Fraudsters are winning the AI arms race, first-party fraud is rising, and siloed systems are holding back defenses, according to DataVisor. Their 2025 Fraud & AML Executive Report, based on surveys of banks, fintechs, credit unions, and ...

CISOs prioritize AI-driven automation to optimize cybersecurity spending

Cybersecurity leaders and consultants identified AI-driven automation and cost optimization as top organizational priorities, according to Wipro. 30% of respondents are investing in AI automation to enhance their cybersecurity operations. ...

How to threat hunt Living Off The Land binaries

In this Help Net Security video, Lee Archinal, Senior Threat Hunter at Intel 471, walks through practical strategies for detecting malicious activity involving Living Off The Land binaries (LOLBins). These are legitimate tools built into ...

Review: Cybersecurity For Dummies, 3rd Edition

If you’re new to cybersecurity and looking for a book that doesn’t overwhelm you with jargon or dive too deep into technical territory, Cybersecurity For Dummies might be a solid starting point. It’s written with beginners in mind and ...

Find the Best CIAM Solution for Your Business: A Comprehensive Guide to Modern Customer Identity Management

We've reached a point where customers won't wait even a few seconds for an app to load or a login to work. In this new era of digital impatience, CIAM platforms have become business critical, serving as direct contributors to conversion rates, ...

What Your Traffic Logs Aren’t Telling You About Cloud Security

Cloud security isn’t just about merely collecting data. You need to extract meaning from it if you want to actually improve your defenses. And while this may sound simple in practice, any seasoned cloud security practitioner will be quick to ...

What is a SOC Report and Why Does Compliance Depend on It?

The post What is a SOC Report and Why Does Compliance Depend on It? appeared first on AI Security Automation. The post What is a SOC Report and Why Does Compliance Depend on It? appeared first on Security Boulevard.

MATLAB Maker MathWorks Recovering From Ransomware Attack

The incident impacted multiple web and mobile applications, licensing services, downloads and online store, website, wiki, MathWorks accounts, and other services. The post MATLAB Maker MathWorks Recovering From Ransomware Attack appeared first on ...