Application Security News and Articles


Secure by Design, Visible by Choice: Why Authentication Page Optimization Matters for B2B SaaS

Enterprise customers demand both ironclad security and seamless user experiences. Your authentication pages are more than just login forms—they’re the gat The post Secure by Design, Visible by Choice: Why Authentication Page Optimization ...

The True Value of Single Sign-On (SSO): A Comprehensive Guide for Technical Professionals

This comprehensive guide was developed to help technical professionals understand the strategic value of SSO and develop implementation approaches appropriate f The post The True Value of Single Sign-On (SSO): A Comprehensive Guide for Technical ...

Zero Outages, Full Visibility: How PacificSource Automated SSL TLS Certificate Lifecycle Management

In healthcare, every second counts. From electronic health records (EHR) to patient portals and claims processing systems, secure digital communication is the backbone of delivering care and protecting sensitive patient information. That security ...

Three-Prong Ghost Hacker Scam Targets Seniors, Others 

The FBI warns of the “Phantom Hacker” scam that has stolen over $1B by tricking victims—often seniors—into moving funds to fake “safe” accounts. Experts say AI will make such scams more convincing and scalable, underscoring the need ...

Cynomi simplifies vendor risk management

Cynomi has launched its Third-Party Risk Management (TPRM) module. Delivered as an add-on to the Cynomi vCISO Platform, the new capability integrates vendor risk management into existing service providers’ workflows. The global third-party risk ...

Building Adaptive and Future-Ready Security Strategies

Learn how to build adaptive and future-ready security strategies using Enterprise SSO and CIAM solutions. Protect your organization from evolving threats with robust authentication and access management. The post Building Adaptive and ...

Microsoft’s September Security Update High-Risk Vulnerability Notice for Multiple Products

Overview On September 10, NSFOCUS CERT detected that Microsoft released the September Security Update patch, fixing 86 security issues involving widely used products such as Windows, Microsoft Office, Azure, and Microsoft SQL Server, including ...

Hush Security emerges from stealth to replace legacy vaults with secretless access

Hush Security has raised $11 million in seed funding led by Battery Ventures and YL Ventures. As agentic AI expands, Hush replaces legacy vaults and secrets across the enterprise with just-in-time, policy-driven access controls enforced at ...

When typing becomes tracking: Study reveals widespread silent keystroke interception

You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis, Maastricht University, and ...

How attackers weaponize communications networks

In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He explains why attackers focus on these networks and how their motivations ...

AI is everywhere, but scaling it is another story

AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They point to governance, visibility, and collaboration as the critical areas ...

The state of DMARC adoption: What 10M domains reveal

In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption across the top 10 million internet domains. He explains how SPF, DKIM, and DMARC work together to prevent email spoofing, ...

Why organizations need a new approach to risk management

To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business leaders don’t just identify and manage risks after they occur, but ...

Everything about the Authorization as a Service

Learn how authorization service, auth as a service, and authorization solutions improve security, compliance, and customer experience with CIAM and SSO. The post Everything about the Authorization as a Service appeared first on Security Boulevard.

How npm Security Collapsed Thanks To a 2FA Exploit

Billions (No, that’s not a typo, Billions with a capital B) of files were potentially compromised. If you thought Node Package Manager (npm), the JavaScript runtime environment Node.js‘s default package manager, had finally stopped ...

Shift from Reactive to Proactive: Leveraging Tenable Exposure Management for MSSP Success

An Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize exposure and enable innovation that is secure and compliant. Whether you’re already leveraging ...

The Future of Defensible Security: From Reactive Playbooks to Attack-Pattern-Aware Autonomous Response

Why static automation isn’t enough—and what real-world adversary data tells us about how the next-gen SOC must evolve. The post The Future of Defensible Security: From Reactive Playbooks to Attack-Pattern-Aware Autonomous Response appeared ...

What Is Goldilocks? (Or How to Set Your Kubernetes Resource Requests)

When we open sourced Goldilocks in October 2019, our goal was to provide a dashboard utility that helps you identify a baseline for setting Kubernetes resource requests and limits. We continue to refine Goldilocks, because getting resource ...

When is the Right Time to Hire a CISO?

  Knowing when to hire a CISO is a challenging proposition – one which most organizations will eventually need to answer. The need to hire a CISO depends on a combination of factors, including but not limited to: Relevance of regulatory ...

Imperva API Security: Authentication Risk Report—Key Findings & Fixes

An in-depth analysis of common JSON Web Token (JWT) mistakes, basic auth, long-lived tokens, and quick, high-impact fixes to secure your APIs. Introduction APIs are the backbone of modern digital services—from mobile apps and e-commerce to ...