Application Security News and Articles


CISOs are managing risk in survival mode

CISOs carry expanding responsibility as cybersecurity budgets rise, AI adoption spreads, and board expectations grow. Risk management now depends on faster decisions, stronger coordination, and better communication across leadership teams. This ...

What are Auth Tokens? Complete Guide to Token-Based Authentication & Implementation

Learn about auth tokens, token-based authentication, JWTs, and implementation strategies. Enhance security and user experience in enterprise SSO and CIAM. The post What are Auth Tokens? Complete Guide to Token-Based Authentication & ...

How can businesses trust AI to handle sensitive data

Are Businesses Ready to Trust AI with Their Most Sensitive Data? The discussion around trusting AI with sensitive data is both inevitable and essential. With AI systems increasingly integrated into business processes, the question now revolves ...

Can AI-driven cloud security assure full data protection

Are You Effectively Managing Non-Human Identities in AI-Driven Cloud Security? Where technology underpins every business function, the security of machine identities—known as Non-Human Identities (NHIs)—has become paramount. But how well are ...

What support is available for implementing Agentic AI systems

How Do Machine Identities Shape Cloud Security? What role do machine identities play, particularly within cloud environments? When organizations continue to transform digitally, the focus on securing machine identities, known as Non-Human ...

Is the security for Non-Human Identities getting better

How Can Organizations Effectively Manage Non-Human Identities? Have you ever considered how the digital backbone of your organization is secured when it comes to managing the vast array of Non-Human Identities (NHIs)? With technology continues to ...

NDSS 2025 – Automated Data Protection For Embedded Systems Via Data Flow Based Compartmentalization

NDSS 2025 - Automated Data Protection For Embedded Systems Via Data Flow Based Compartmentalization Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Zelun Kong (University of Texas at Dallas), Minkyung Park ...

The Top 26 Security Predictions for 2026 (Part 2)

Welcome to the second installment of this comprehensive annual look at global cybersecurity industry prediction reports from the top security vendors, publications and thought leaders. The post The Top 26 Security Predictions for 2026 (Part 2) ...

Week in review: WatchGuard Firebox firewalls attacked, infosec enthusiasts targeted with fake PoCs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Building cyber talent through competition, residency, and real-world immersion In this Help Net Security interview, Chrisma Jackson, Director of ...

How impenetrable are secrets vaulting solutions

How Are Non-Human Identities Changing the Cybersecurity Landscape? What if the biggest vulnerability in your cybersecurity strategy was not a human error but a machine identity left unchecked? Secrets vaulting solutions are increasingly seen as ...

Are current PAM solutions capable of handling NHIs

How Secure Are Your Non-Human Identities? Have you ever wondered how well your organization handles Non-Human Identities (NHIs) within your cybersecurity framework? With technology progresses, so does the complexity of managing machine identities ...

What does a free to implement AI compliance strategy look like

How Can Organizations Implement a Free AI Compliance Strategy Effectively? Are you fully prepared to leverage AI while remaining compliant with regulations? Where enterprises increasingly rely on artificial intelligence, maintaining compliance ...

NDSS 2025 – CounterSEVeillance: Performance-Counter Attacks On AMD SEV-SNP

Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Stefan Gast (Graz University of Technology), Hannes Weissteiner (Graz University of Technology), Robin Leander Schröder (Fraunhofer SIT, Darmstadt, Germany ...

What “Verified Identity Data” Means for APIs — and How to Evaluate a Data Partner

If you’re building fraud prevention, risk scoring, or identity enrichment into a product, your outcomes depend on one thing: the quality of your identity data. A lot of identity data on the market is broad but unverified: raw broker feeds, ...

Inside the Biggest Cyber Attacks of 2025

2025 has emerged as one of the most disruptive years for cybersecurity, marked by unprecedented breach volumes, record-breaking credential leaks, and cascading supply-chain failures. Across just 12 months, cyber incidents have impacted ...

Friday Squid Blogging: Squid Camouflage

New research: Abstract: Coleoid cephalopods have the most elaborate camouflage system in the animal kingdom. This enables them to hide from or deceive both predators and prey. Most studies have focused on benthic species of octopus and ...

What Happens If You Lose Your FedRAMP Authorization?

We’ve talked a lot about the process a business goes through to achieve FedRAMP authorization and the ability to work with a government department or agency. What about the other side of the coin? What happens if you lose that authorization? ...

What makes an AI system smart in managing secrets

How Does a Smart AI System Enhance Managing Secrets in Cybersecurity? Have you ever wondered how a smart AI system revolutionizes the way we manage secrets in cybersecurity? The evolution of technology is as thrilling as it is vital, especially ...

How can secrets security fit within a tight IT budget

Are Non-Human Identities the Missing Piece in Your Cybersecurity Strategy? How often do we consider the importance of non-human identities (NHIs)? These machine identities are increasingly at the forefront of security strategies, especially for ...

How to stay ahead in managing NHIs effectively

Are you effectively addressing the cybersecurity challenges associated with Non-Human Identities (NHIs)? The management of Non-Human Identities (NHIs) has become a critical aspect of cybersecurity strategies. NHIs, or machine identities, are ...