Application Security News and Articles


SonarQube: Your Code’s GPS for Quality and Security

What in the World is SonarQube? (The Friendly Intro)Continue reading on ThreadSafe »

SonarQube: Your Code’s GPS for Quality and Security

What in the World is SonarQube? (The Friendly Intro)Continue reading on Medium »

Complexity and AI put identity protection to the test

Identity has become a core pillar of cybersecurity strategy. Remote work, cloud-first adoption, and distributed supply chains have moved identity from “a tactical IT consideration to a strategic pillar of cybersecurity,” according to Cisco ...

Who is a Chief Compliance Officer?

The role of a chief compliance officer (CCO) has become indispensable for organizations operating in diverse industries. The CCO is responsible for ensuring that the organization adheres to internal policies as well as external legal and ...

What the GitGuardian secrets sprawl report reveals about leaked credentials

In this Help Net Security video, Dwayne McDaniel, Senior Developer Advocate at GitGuardian, presents findings from The State of Secrets Sprawl 2025. McDaniel explains why generic secrets are especially difficult to detect, why private ...

Cybersecurity jobs available right now: September 2, 2025

CISO Shift Technology | France | Remote – View job details As a CISO, you will develop and execute a comprehensive enterprise information security strategy aligned with company goals and risk tolerance. Lead incident response ...

Scammer Spoofs a City Supplier, Steals $1.5 Million from Baltimore

A scammer that spoofed a city supplier convinced employees in the City of Baltimore's Accounts Payable Department to send two EFT payments totaling more than $1.5 million to a bank account they controlled and illustrating the ongoing threat posed ...

5 ways Doppler reduces risk in enterprise secrets management

Discover 5 ways Doppler helps enterprises reduce risk with secure secrets management, automated rotation, role-based access control, and real-time access visibility. The post 5 ways Doppler reduces risk in enterprise secrets management appeared ...

Achieving Stability in NHI Lifecycle Management

Why Is NHI Lifecycle Management Essential? Are you ever curious why managing Non-Human Identities (NHIs) and their secrets is considered a crucial aspect of cybersecurity? It’s not just about maintaining secure systems; it’s about creating ...

Are You Fully Satisfied with Your Secrets Rotation?

Are Your Secrets Rotation Standards Meeting Expectations? Does your organization have a comprehensive secrets rotation system that instills confidence and satisfaction? Secrets rotation is a pivotal aspect of data management, especially ...

Understanding the Two Sides of Infostealer Risk: Employees and Users

Co-authored by Constella Intelligence and Kineviz Infostealer malware dominates today’s cyber threat landscape. Designed to extract credentials, cookies, session tokens, autofill data, and other forms of digital identity, infostealers operate ...

Super-Apps and Embedded Finance: The Innovation Battle for Customer Wallets

Forget downloading ten different apps for ten different needs. In 2025, the battle for your customer’s wallet isn’t happening in banks or retail stores. It...Read More The post Super-Apps and Embedded Finance: The Innovation Battle for ...

Why Incidents Keep Happening (And It’s Usually Not What You Think)

Think incidents happen because of bad code? Think again. After handling countless outages, I've discovered the real culprits - and they're not what most people expect. Here's why your systems really fail. The post Why Incidents Keep Happening ...

Penetration testing: All you need to know

At a breakneck pace, and with it, cyber threats are becoming more sophisticated and harder to detect. Organizations today face a heightened risk of data breaches, system compromises, and sophisticated cyberattacks. To counteract these risks, ...

Hackers Threaten Google Following Data Exposure

A recent breach involving a third-party Salesforce system used by Google has sparked an unusual escalation. Although no Gmail inboxes, passwords, or internal Google systems were accessed, attackers gained entry to a sales database that included ...

Top 10 Cybersecurity Companies in United States (2025 Ranking)

Cyberattacks in the United States aren’t slowing down. From billion-dollar ransomware hits to stealthy supply chain breaches, every month brings a new headline. And the cost is staggering. The average... The post Top 10 Cybersecurity Companies ...

Black Hat Fireside Chat: API sprawl turns SMBs into prime targets — simple flaws invite breaches

Cyber attackers don’t always need sophisticated exploits. Too often, they succeed by exploiting the basics. Related: 51 common SMB cyberattacks That’s the warning from Chris Wallis, founder and CEO of London-based Intruder, who sat down with ...

South Korea AI Act

What is the South Korea AI Act? South Korea’s Framework Act on the Development of Artificial Intelligence and Creation of a Trust Foundation, often referred to simply as the AI Framework Act or the AI Basic Act, is the country’s landmark law ...

United States Labor Day 2025

Permalink The post United States Labor Day 2025 appeared first on Security Boulevard.

Statements of Support for Security Best Practices

Explore the significance of statements of support for security best practices in enterprise SSO and CIAM. Learn about MFA, access control, and vendor endorsements. The post Statements of Support for Security Best Practices appeared first on ...