Application Security News and Articles


DigitalOcean boosts identity management offerings with custom roles

DigitalOcean announced expanded capabilities for its identity management offerings with custom roles, the newest Role-Based Access Control (RBAC) offering for its cloud platform. This offering allows customers to create roles that are ...

GenAI is everywhere, but security policies haven’t caught up

Nearly three out of four European IT and cybersecurity professionals say staff are already using generative AI at work, up ten points in a year, but just under a third of organizations have put formal policies in place, according to new ISACA ...

How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics

This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this ...

Cybersecurity jobs available right now: July 1, 2025

Application Security Engineer Fireblocks | Israel | Hybrid – View job details As an Application Security Engineer, you will improve and secure the company’s continuous integration and deployment pipelines through CI/CD security ...

News alert: SquareX research finds browser AI agents are proving riskier than human employees

Palo Alto, Calif., Jun. 30, 2025, CyberNewswire–Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case. SquareX’s research reveals that Browser AI Agents are more likely to ...

Why compliance gets easier when you don’t manually manage secrets

Manually managing secrets increases your compliance burden. This article explains what frameworks demand and how managed secrets platforms like Doppler keep you audit-ready. The post Why compliance gets easier when you don’t manually manage ...

Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025

What you need to know about SCA tools Quick Answer: The top SCA tools in 2025 are Mend.io (best for automated remediation and proactive SCA), Sonatype Lifecycle (known for enterprise policy management), Snyk (known for developer experience), and ...

Evaluating AI Solutions for the SOC: Why Centralized Autonomy Outperforms Agentic AI

Compare centralized autonomous SOC engines like Morpheus against agentic AI solutions. Learn why unified control beats agent swarms. The post Evaluating AI Solutions for the SOC: Why Centralized Autonomy Outperforms Agentic AI appeared first on ...

The Rise of Agentic AI: Uncovering Security Risks in AI Web Agents

In our first post, we introduced the world of AI web agents – defining what they are, outlining their core capabilities, and surveying the leading frameworks that make them possible. Now, we’re shifting gears to look at the other side of the ...

The Rise of Agentic AI: From Chatbots to Web Agents

Disclaimer: This post isn’t our usual security-focused content – today we’re taking a quick detour to explore the fascinating world of AI agents with the focus of AI web agents. Enjoy this educational dive as a warm-up before we get into ...

Empower Your Team Through Efficient NHIs Management

Why Should Businesses Prioritize NHIs Management? While human identities have consistently held the limelight in cybersecurity, a lesser-known, yet equally consequential, aspect is the management of non-human identities (NHIs). Of late, the ...

Improving NHIs Management in Your Organization

Is Your Organization Harnessing the Full Power of Non-Human Identities? The increasing reliance on automation and cloud computing in industries such as healthcare, financial services, and travel, has led to a surge in Non-Human Identities (NHIs). ...

Cato Networks Raises $359 Million to Expand SASE Business

Founded in 2015, the Tel Aviv based company has now raised more than $1 billion and claims more than 3,500 customers. The post Cato Networks Raises $359 Million to Expand SASE Business appeared first on SecurityWeek.

The Emerging Identity Imperatives of Agentic AI

4 min readAI agents are changing how identity and access work but most teams are unprepared. The post The Emerging Identity Imperatives of Agentic AI appeared first on Aembit. The post The Emerging Identity Imperatives of Agentic AI appeared ...

LinuxFest Northwest: See How Far COSMIC Has Come This Year

Authors/Presenters: Carl Richell (CEO And Founder, System76) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb ...

Escaping SOC Burnout: State of Security 2025

Michael Fanning, CISO at Splunk, shares insights on cybersecurity challenges highlighted in the Splunk State of Security report. Key issues include analyst burnout and alert fatigue, which persist over time. Fanning discusses how AI can improve ...

ICE’s Shiny New ‘AI’ Facial Recognition App: False Positives Ahoy!

Mobile Fortify: Liberty’s existential threat, or sensible way to ID illegal immigrants? The post ICE’s Shiny New ‘AI’ Facial Recognition App: False Positives Ahoy! appeared first on Security Boulevard.

Dell’s Comprehensive Approach to AI and the Dell AI Factory

Artificial intelligence (AI) is disrupting every industry, promising unprecedented innovation and efficiency. But that power requires responsibility, especially in the realm of cybersecurity. As businesses race to adopt AI, the question ...

Randall Munroe’s XKCD ‘Farads’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Farads’ appeared first on Security Boulevard.

How to Reduce Alert Fatigue in Cybersecurity

The post How to Reduce Alert Fatigue in Cybersecurity appeared first on AI Security Automation. The post How to Reduce Alert Fatigue in Cybersecurity appeared first on Security Boulevard.