Application Security News and Articles


Cyber defense cannot be democratized

The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called democratization of security, on the other hand, has resulted in chaos. The ...

Identity management was hard, AI made it harder

Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven identities and machine accounts grow, most security teams are not prepared to ...

AI moves fast, but data security must move faster

Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and unfamiliar security risks. As companies rush to adopt these tools, many ...

Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach

In this episode, we discuss a recent significant cyber attack where Palo Alto Networks experienced a data breach through their Salesforce environment due to a compromised SalesLoft drift integration. Throughout the discussion, we highlight why ...

Keep Your Data Safe with Proper Secrets Management

Is Your Organization Managing its Non-Human Identities Effectively? Effective secrets and Non-Human Identities (NHIs) management is critical. These entities form the foundation of your organization’s security infrastructure, playing a crucial ...

Proactively Manage NHIs to Avoid Data Breaches

Why Proactive NHI Management is Crucial? Is your organization ready to face the ruthlessness of cyber threats? While businesses continue to adopt cloud computing, it is becoming vital to manage and secure Non-Human Identities (NHIs) to avoid data ...

BSidesSF 2025: Everyday AI: Leveraging LLMs For Simple, Effective Security Automation

Creator, Author and Presenter: Matthew Sullivan, Dominic Zanardi Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

No Retirement? No Problem: Rethinking Workforce Planning

For decades, governments nationwide have predicted a coming tidal wave of retirements will cripple critical government services. But recent surveys say otherwise. The post No Retirement? No Problem: Rethinking Workforce Planning appeared first on ...

AI & Code: Trust It? Or Treat It Like a Leaky Faucet?

Ever feel like you’re handing your secrets to a robot you just met? That’s how it feels putting private code into AI tools. Are you really…Continue reading on Medium »

Week in review: Several companies affected by the Salesloft Drift breach, Sitecore 0-day vulnerability

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Zscaler, Palo Alto Networks, SpyCloud among the affected by Salesloft Drift breach In the wake of last week’s revelation of a breach at ...

Top Identity and Access Management Tools for 2025

Discover the leading Identity and Access Management (IAM) tools for 2025. Enhance security and streamline user management with our expert guide. The post Top Identity and Access Management Tools for 2025 appeared first on Security Boulevard.

Using Programmable Tokens for Secure Windows Login

Enhance Windows security using programmable tokens for multi-factor authentication. Learn how to set up and use hardware tokens for a more secure login process. The post Using Programmable Tokens for Secure Windows Login appeared first on ...

DigitalOcean Just Changed the Enterprise SSO Game Forever – And Every B2B Company Should Take Notice

When B2B companies don't provide SSO options, they're not just losing potential enterprise customers - they're actively hindering their existing customers' security and productivity. The post DigitalOcean Just Changed the Enterprise SSO Game ...

Relieve Your Security Team with Automated NHIs

Can Automated NHIs Bolster Your Cybersecurity? Non-Human Identities (NHIs) and secrets security management are gaining significant traction as vital players in enhancing the security posture. But, what exactly are NHIs and how can they relieve ...

Powerful Tools for Securing Non-Human Identities

Why is NHI Security a Top Priority in Today’s Business Landscape? The rapidly escalating cybersecurity threats are making organizations keen on fortifying their defenses. But are they considering the risk that lurks within their systems? Many ...

How Trust Centers and AI are replacing security questionnaires and accelerating B2B sales

Something strange happens in the final weeks of a sales quarter. No matter how aligned the stakeholders are, it often takes just one email to derail a deal: “Hey, before we proceed, our InfoSec team needs you to fill out this security ...

How to Pick the Right Authentication Solution for Your Growing Startup

Compare top authentication providers for growing startups. Learn which auth solution saves money, time, and improves user experience for 40k+ users. The post How to Pick the Right Authentication Solution for Your Growing Startup appeared first on ...

BSidesSF 2025: Slaying The Dragons: A Security Professional’s Guide To Malicious Packages

Creator, Author and Presenter: Kirill Boychenko Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Securing AI Models Against Adversarial Attacks in Financial Applications

The rapid adoption of artificial intelligence (AI) agents across industries has brought significant benefits but also increased exposure to cyber threats, particularly adversarial attacks. According to the Deloitte Threat Report, nearly 30% of ...

6 Best Practices for CMMC Physical Security Control

The first C in CMMC stands for cybersecurity, so it makes sense that the vast majority of content and information about it (both here and elsewhere online) is focused on the cyber aspect. Digital security makes up the bulk of the certification, ...