Application Security News and Articles


Old authentication habits die hard

Many organizations still rely on weak authentication methods while workers’ personal habits create additional risks, according to Yubico. Training and policy gaps 40% of employees said they have never received cybersecurity training. Even among ...

Phishing is old, but AI just gave it new life

The volume of cyberattacks has reached staggering levels, with new tactics that blur the line between legitimate and malicious activity. A new threat report from Comcast, based on 34.6 billion cybersecurity events analyzed over the past year, ...

CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities

Following reports the Cl0p ransomware group has been extorting Oracle E-Business Suite customers, Oracle released an advisory for a zero-day that was exploited in the wild. Background Tenable’s Research Special Operations (RSO) team has ...

Feeling Reassured by Your Secrets Security?

What Ensures Your Data Remains Protected at Every Stage? Non-Human Identities (NHIs) and Secrets Security Management form the backbone of fortified cybersecurity strategies, especially for organizations heavily utilizing cloud environments. Have ...

Keeping Your Cloud Environment Safe

Why Is Non-Human Identity Management Crucial for Cloud Safety? How can organizations effectively manage Non-Human Identities (NHIs) to maintain cloud safety? For industries that heavily rely on digital infrastructure, such as financial services, ...

The Emperor’s New Clothes: Why Compulsory CBTs and Phishing Tests Keep Failing

Most phishing training, and indeed most compulsory computer-based training (CBT) modules, are largely ineffective in reducing incidents - and are therefore a waste of time and resources. Finally we have the data we need to challenge this, and ...

USENIX 2025: PEPR ’25 – Career Advice For Privacy Engineers: From Resume To Interview To Finding The Next Job

Creator, Author And Presenters: Jason A. Novak, Google Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ...

CMMC Is Finalized. How Will It Impact State and Local Government?

What is Cybersecurity Maturity Model Certification from the Department of Defense and why should state and local governments care about it? How agencies can leverage funding to grow their security programs. The post CMMC Is Finalized. How Will It ...

Single Sign-on for Data Platforms

Discover how single sign-on (SSO) enhances security, streamlines user access, and improves compliance across your data platforms. Learn about the benefits of SSO for data management. The post Single Sign-on for Data Platforms appeared first on ...

Is Passwordless Authentication Considered Multi-Factor?

Explore if passwordless authentication counts as multi-factor. Understand the factors, methods, and security implications for modern software development. The post Is Passwordless Authentication Considered Multi-Factor? appeared first on Security ...

Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How to protect the global cable network The resilience of the world’s submarine cable network is under new ...

Italy’s AI Law Comes Into Force

On October 10, 2025, Italy will become the first EU member state to bring a national artificial intelligence law into force, moving ahead of the bloc’s landmark EU AI Act. Law No. 132 of 2025, published in the Gazzetta Ufficiale in late ...

Ensuring Certainty in Identity Security

How Do Non-Human Identities Shape Identity Security in the Digital Landscape? Imagine where non-human identities (NHIs) dictate the security of your data. With machines performing a vast array of tasks autonomously, ensuring their identities are ...

Innovations in Machine Identity Management

How Secure Are Your Machine Identities in Today’s Digital Landscape? Managing machine identities and their security is increasingly critical as businesses continue to migrate vast amounts of data to the cloud. Each machine identity, much like a ...

Can You Trust Your Cloud Security Measures?

What Are Non-Human Identities (NHIs) and Why Are They Critical to Cloud Security? With businesses move their operations to the cloud, how can they be certain that their cloud security measures are robust enough? The key might lie in understanding ...

Does Your NHI Strategy Deliver Value?

What Makes NHI Management a Must-Have for Your Business? Have you ever wondered how machine identities are reshaping cybersecurity frameworks? Non-human identities (NHIs), composed of machine identities, are increasingly pivotal. These machine ...

USENIX 2025: PEPR ’25 – Verifying Humanness: Personhood Credentials For The Digital Identity Crisis

Creator, Author and Presenter: Tanusree Sharma, Pennsylvania State University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The ...

The Role of Cybersecurity in Effective Business Continuity Planning

Business continuity integrates both people and technology to help organizations anticipate, manage, and recover from disruptions to regular business operations. While business continuity planning includes disaster recovery—the process of ...

Scam Compound Operators: Members of The Four Great Families sentenced to death in China

(photo from BBC article "China sentences 11 members of mafia family to death") On Monday this week, Chinese authorities sentenced to death 16 members of "The Four Families" for the multitude of crimes they committed while operating scam ...

How Secure Are Your Non-Human Identities?

How Critical is NHI Security for Your Organization? How often have we pondered the security measures surrounding Non-Human Identities (NHIs)? With machine identities continue to proliferate across digital, understanding and securing these ...