Application Security News and Articles


From Exposure to Action: How Proactive Identity Monitoring Turns Breached Data into Defense

Every 39 seconds, somewhere in the world, a new cyberattack is launched — and far too often, it’s not a sophisticated hack but the reuse of legitimate credentials already exposed online. As data breaches multiply and stolen credentials ...

Tanium integrates AI-driven Triage and Identity Insights into Microsoft Security Copilot

Tanium announced the general availability of Tanium Security Triage Agent and Tanium Security Triage Agent with Identity Insights in Microsoft Security Copilot. “Agentic AI is transforming the workflows used by security operations to ...

Vanta’s Agentic Trust Platform redefines how enterprises earn, prove, and scale trust

Vanta unveiled a number of new products that redefine how enterprises earn and prove trust at scale. Powered by intelligent automation, Vanta’s Agentic Trust Platform helps teams understand their environment, anticipate what’s next, and ...

CredShields Joins Forces with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs

Singapore, Singapore, 19th November 2025, CyberNewsWire The post CredShields Joins Forces with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs appeared first on Security Boulevard.

Cayosoft Guardian SaaS expands identity continuity with always-on hybrid protection

Cayosoft announced an expansion in the deployment of its flagship platform, Cayosoft Guardian SaaS. This milestone marks a significant evolution in identity continuity, empowering enterprises to detect, respond, and recover instantly, even when ...

Microsoft Unveils Security Enhancements for Identity, Defense, Compliance

Microsoft announced new security capabilities for Defender, Sentinel, Copilot, Intune, Purview, and Entra.  The post Microsoft Unveils Security Enhancements for Identity, Defense, Compliance appeared first on SecurityWeek.

authID Mandate Framework establishes governance model for secure agentic AI deployment

authID unveiled the authID Mandate Framework, a comprehensive governance model for agentic AI security with support for non-human identities, including autonomous and semi-autonomous AI agents. Mandate provides enterprises with the trust ...

Nightfall’s AI File Classifier Detectors bring LLM intelligence to unstructured IP protection

Nightfall announced the launch of AI File Classifier Detectors, the first solution to use large language models (LLMs) to classify and protect business-critical documents that traditional DLP tools cannot see. Most high-value assets, including ...

CyberProof’s Agentic AI framework sets a new standard for flexible, threat-led defense

CyberProof has launched its new Agentic AI framework and SOC agents which are designed to improve threat detection, incident response, and operational efficiency for exposure and defense management. This framework is a key part of ...

F5 BIG-IP v21.0 accelerates enterprise AI initiatives

F5 introduced BIG-IP v21.0, giving customers a unified approach to app delivery, security, and scale in the AI era. This major release extends the F5 Application Delivery and Security Platform (ADSP) with a purpose-built delivery engine for ...

Bitwarden extends passkey login to Chromium-based browsers

Bitwarden announced expanded passkey login capabilities for Bitwarden browser extensions. The update enables users to access their vaults in Chromium-based browsers using a passkey instead of a master password, delivering a secure, ...

Google Email Deliverability: How to Avoid Spam Folders

Improve Google email deliverability and land in Gmail inboxes. Learn best practices and start optimizing your email performance today. The post Google Email Deliverability: How to Avoid Spam Folders appeared first on Security Boulevard.

Record-Breaking Cloud Incident Brings Outage Through the Internet

November 18, 2025 – Cloudflare Global Outage (not a DDoS) The timing and Cloudflare’s brief initial misdiagnosis caused widespread confusion, with many people incorrectly believing Cloudflare had been DDoSed. Some reports even mentioned that ...

The long conversations that reveal how scammers work

Online scammers often take weeks to build trust before making a move, which makes their work hard to study. A research team from UC San Diego built a system that does the patient work of talking to scammers at scale, and the result offers a look ...

Email Deliverability Consultant: How to Boost Campaign ROI

Find out what an email deliverability consultant does, key signs you need one, and how they help optimize email deliverability and engagement. The post Email Deliverability Consultant: How to Boost Campaign ROI appeared first on Security Boulevard.

Metis: Open-source, AI-driven tool for deep security code review

Metis is an open source tool that uses AI to help engineers run deep security reviews on code. Arm’s product security team built Metis to spot subtle flaws that are often buried in large or aging codebases where traditional tools struggle. ...

How to cut security tool sprawl without losing control

In this Help Net Security video, Jon Taylor, Director and Principal of Security at Versa Networks, talks about how organizations can deal with security tool sprawl. He explains why many teams end up with too many tools, especially as zero trust ...

Product showcase: Proton Pass, a password manager with identity protection

Managing passwords can be a real headache, and it’s still common to fall back on reusing them or storing them in a browser without much protection. Proton Pass, built by the Swiss company Proton AG (the team behind Proton Mail and Proton VPN), ...

How to Enable Safe File Handling for Clinical and Research Portals

The post How to Enable Safe File Handling for Clinical and Research Portals appeared first on Votiro. The post How to Enable Safe File Handling for Clinical and Research Portals appeared first on Security Boulevard.

Anthropic Disruption of an AI-Run Attack and What It Means for Agentic Identity

4 min readAnthropic’s recent disclosure of an AI-driven espionage campaign it halted represents less a new class of attack than a faster, more persistent version of patterns the industry has seen before. What distinguishes this incident is the ...