Application Security News and Articles


Securing Your Assets: Strategies That Work Every Time

Why Are Non-Human Identities the Unsung Heroes of Asset Security? Where digital transformation drives business innovation, the necessity for robust asset security strategies is paramount. But here’s a question often overlooked: How do ...

USENIX 2025: PEPR ’25 – UsersFirst: A User-Centric Threat Modeling Framework For Privacy Notice And Choice

Creators, Authors and Presenters: Norman Sadeh And Lorrie Cranor, Carnegie Mellon University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. ...

Vulnerability Management Tools and Software Overview

Explore vulnerability management tools and software. Learn about key features, top solutions, and how they help protect against cyber threats. Enhance your security posture today. The post Vulnerability Management Tools and Software Overview ...

Complete Guide to Understanding Risk-Based Authentication

Learn everything about Risk-Based Authentication (RBA): its benefits, implementation, and future trends. Enhance your application security with this comprehensive guide. The post Complete Guide to Understanding Risk-Based Authentication appeared ...

Cloud Posture for Lending Platforms: Misconfigurations That Leak PII

We have witnessed a surge in cloud adoption and data exposures, with a similar trajectory. A cloud security report highlights that 95% of organizations experienced cloud-related breaches in an 18-month period. Among them, 92% of breaches exposed ...

China Prepares for Cyberattacks

  China has implemented regulations for 1-hour reporting of severe cybersecurity incidents. This would include disruptions that impact over 50% of the people in a province or 10 million people, such as critical infrastructure attacks. The ...

Cisco Firewall and VPN Zero Day Attacks: CVE-2025-20333 and CVE-2025-20362

IntroductionOn September 25, 2025, Cisco released a security advisory to patch three security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD) software, ...

CMMC Compliance Becomes Mandatory for Defense Contractors

We’ve known it’s been coming, but it’s finally here: CMMC is no longer optional. Approval to issue the new Final Rule was fast-tracked, and the deadline is looming. In Brief: What is CMMC? CMMC is the Cybersecurity Maturity Model ...

Are Your Secrets Management Practices Up to Par?

Why Are Non-Human Identities Crucial in Cybersecurity? How often do we consider machine identities when contemplating cybersecurity measures? It’s clear that non-human identities (NHIs) are essential players in maintaining robust security ...

Staying Ahead of Cyber Threats with Proactive NHIs

Are You Prepared for the Next Cybersecurity Threat? Where cyber threats evolve faster than yesterday’s news, staying ahead requires a multi-faceted approach. One significant area of focus is the management of Non-Human Identities (NHIs), ...

USENIX 2025: Using Privacy Infrastructure To Kickstart AI Governance: NIST AI Risk Management Case Studies

Creators, Authors and Presenters: Katharina Koerner, Trace3; Nandita Rao Narla, DoorDash Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. ...

China is Fueling Surveillance Technology Adoption in Latin America—Who is in Charge of Data Privacy?

China’s Belt and Road Initiative (BRI) is well known for funding major infrastructure projects, including new highways, ports and energy plants across more than 150 countries. However, China has also gained a serious foothold when it comes to ...

News alert: Living Security unveils HRMCon 2025 lineup amid 81% human cyber risk visibility gap

Austin, Texas, Sept. 25, 2025, CyberNewswire — Living Security, a global leader in Human Risk Management (HRM), today announced the full speaker lineup for the Human Risk Management Conference (HRMCon 2025), taking place October 20, 2025, at ...

News alert: Gcore Radar flags record-breaking DDoS surge — 41% spike in first half of 2025

Luxembourg, Luxembourg, Sept. 25, 2025, CyberNewswire — Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q1-Q2 2025 Radar report into DDoS attack trends. DDoS attacks have reached ...

How to Protect & Monetize Your Content in The Age of AI

Discover how publishers and e-commerce platforms can protect content from AI scraping, regain visibility into LLM traffic, and unlock new monetization opportunities with DataDome’s real-time AI detection and monetization tools. The post How to ...

Why Identity and Access Still Represent the Weakest Link

Idan Dardikman, co-founder and CTO of Koi Security, discusses the company’s emergence from stealth and its mission to address one of cybersecurity’s most persistent challenges: securing identity. Dardikman explains that while the industry has ...

Randall Munroe’s XKCD ‘’Chess Variant”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Chess Variant” appeared first on Security Boulevard.

Securing the Journey: Cybersecurity Challenges in the Tourism Industry

This weekend is World Tourism Day, a celebration of the global travel industry and the cultural, economic, and social connections it fosters. However, as the tourism industry continues to grow and evolve, it faces an increasing array of ...

Bridging the Gap Between Security Teams and Tools

Craig Adams, chief product officer at Rapid7, discusses the growing complexity of security operations and how organizations can better align tools, teams and processes. Adams, a longtime technology leader, notes that one of the biggest pain ...

This Time, I Had Something Special to Offer

The call came from a Fortune 20 customer yesterday morning. “Hey, Vinay, we’re getting flooded with noise about these two new Cisco ASA/FTD vulnerabilities that CISA posted the emergency advisory on. We are seeing a ton of inconsistent ...