Application Security News and Articles


Get Reassured with Reliable Cloud NHI Practices

Does Your Cloud Security Strategy Include Reliable NHI Practices? Data safeguarding and secrets management are fundamental for any organization aiming for a secure infrastructure. Building a robust, cloud-based infrastructure relies heavily on ...

Feel Assured with Improved NHI Security Measures

How Assured Are You About Your Organization’s NHI Security? Non-Human Identities (NHIs) and their Secret Security Management have become a key focal point. But how confident are you in your organization’s current NHI security measures? With ...

Staying Ahead in Non-Human Identity Security

Can Non-Human Identity Security Give Your Business an Edge? Imagine where your machine identities and their “secrets” are managed with the proficiency of a seasoned cybersecurity specialist. Imagine if these identities, like tourists in a ...

Tabletop Exercises: Are They Worth It? (Yes)

“Fail. Fail fast.” How often, if at all, does your organization practice failing safely?  That’s the goal of a tabletop exercise. You simulate a cyber attack against your organization, not to win, but to expose security, communication, and ...

Palo Alto Networks Extends Scope and Reach of SASE Platform

Palo Alto Networks this week revealed it will update its secure access service edge (SASE) platform that adds an ability to identify and neutralize malware in real time as end users employ an enterprise-grade browser that is integrated into the ...

My Latest Book: Rewiring Democracy

I am pleased to announce the imminent publication of my latest book, Rewiring Democracy: How AI will Transform our Politics, Government, and Citizenship: coauthored with Nathan Sanders, and published by MIT Press on October 21. Rewiring Democracy ...

BSidesSF 2025: Can Cyber Mercenaries And Human Rights Coexist?

Creators, Authors and Presenters: Bill Marczak, Cooper Quintin, Eva Galperin Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. ...

Randall Munroe’s XKCD ‘Predicament’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Predicament’ appeared first on Security Boulevard.

Making Self-Service Password Reset and Account Recovery Secure

Self-service password reset (SSPR) and self-service account recovery (SSAR) are essential for reducing IT workload and empowering users. However, these solutions, if not implemented securely, can become an organization's biggest security hole. Up ...

Catalog the Crown Jewels: First Step in Breach Readiness

Yes, our worst nightmares are probably about to happen. WIRED has just reported that “The Era of AI-Generated Ransomware Has Arrived.” What’s more, the U.S.-based artificial intelligence (AI) company Anthropic admitted that its technology ...

LLM06: Excessive Agency – FireTail Blog

Sep 05, 2025 - Lina Romero - In 2025, we are seeing an unprecedented rise in the volume and scale of AI attacks. Since AI is still a relatively new beast, developers and security teams alike are struggling to keep up with the changing landscape. ...

IRONSCALES Honored with CRN 2025 Annual Report Card (ARC) Award

Solution Providers Rank IRONSCALES as the Top Performer in Security - Email and Web Today we’re excited to announce that IRONSCALES has earned a 2025 CRN Annual Report Card (ARC) Award in Security - Email and Webfrom CRN®, a brand of The ...

The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows

On September 5, 2025, GitGuardian discovered GhostAction, a massive supply chain attack affecting 327 GitHub users across 817 repositories. Attackers injected malicious workflows that exfiltrated 3,325 secrets, including PyPI, npm, and DockerHub ...

BSidesSF 2025: CISO Series Podcast – LIVE!

Creator, Author and Presenter: David Spark, Andy Ellis, Alexandra Landegger Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. ...

How to Close the AI Governance Gap in Software Development

Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight. The post How to Close the AI Governance Gap in Software Development appeared first on ...

The New Edge: Tunnel-Free, AI and Quantum-Ready

In Part 3 of this series, we saw how stealth networking is already transforming industries, from healthcare to smart factories, defense, and retail. In this final installment, we look to the horizon. What will define the next decade of edge ...

Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool

Called A2, the framework mimics human analysis to identify vulnerabilities in Android applications and then validates them. The post Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool appeared first on SecurityWeek.

Cybersecurity Snapshot: Expert Advice for Securing Critical Infrastructure’s OT and Industrial Control Systems, IoT Devices and Network Infrastructure

Destructive cyber attacks against critical infrastructure have unfortunately become increasingly frequent. Just last week, multinational government agencies blared the alarm about a global cyber espionage campaign targeting critical ...

Multi-Cloud Security

Enterprises today are no longer confined to a single IT environment. Instead, they are embracing multi-cloud strategies—leveraging services from AWS, Microsoft Azure, Google Cloud, and private clouds to achieve flexibility, scalability, and ...

Unified Security Visibility

Cybersecurity today is more complex than ever before. Organizations operate in hybrid and multi-cloud environments, manage remote and mobile workforces, and depend on countless third-party applications and integrations. This interconnectedness ...