Application Security News and Articles


Nokod Security launches Adaptive Agent Security to protect AI agents across the entire ADLC

Nokod Security announced the launch of Adaptive Agent Security, a solution that delivers real-time visibility, governance, and protection from threats across the Agent Development Lifecycle (ADLC). Citizen developers and business users are ...

GDPR Data Subject Rights in 2025-and Beyond

The post <b>GDPR Data Subject Rights in 2025-and Beyond</b> appeared first on Sovy. The post GDPR Data Subject Rights in 2025-and Beyond appeared first on Security Boulevard.

Beyond Passwords: How Behaviour and Devices Shape Stronger Logins

Discover how behaviour, devices, and adaptive authentication systems create smarter, stronger, and more secure logins for modern enterprises. The post Beyond Passwords: How Behaviour and Devices Shape Stronger Logins appeared first on Security ...

Healthcare security is broken because its systems can’t talk to each other

In this Help Net Security interview, Cameron Kracke, CISO at Prime Therapeutics, discusses how the healthcare ecosystem can achieve cohesive security visibility. With hospitals, clinics, telehealth, and cloud partners all in the mix, maintaining ...

Wanna bet? Scammers are playing the odds better than you are

Placing a bet has never been this easy, and that’s the problem. The convenience of online gambling is the same thing scammers are cashing in on. Whether it’s a fake app, a “can’t-miss” tipster, or a rigged casino, the game is stacked ...

Sprout: Open-source bootloader built for speed and security

Sprout is an open-source bootloader that delivers sub-second boot times and uses a clean, data-driven configuration format that works across operating systems. “We built Sprout because we were frustrated by how fragile and slow traditional ...

Automation can’t fix broken security basics

Most enterprises continue to fall short on basic practices such as patching, access control, and vendor oversight, according to Swimlane’s Cracks in the Foundation: Why Basic Security Still Fails report. Leadership often focuses on broad ...

Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases

Google and Mozilla have released fresh Chrome and Firefox updates that address multiple high-severity security defects. The post Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases appeared first on SecurityWeek.

Unlocking Cloud Security: Introducing the New AWS Key Rotation Feature in CipherTrust Cloud Key Management

Unlocking Cloud Security: Introducing the New AWS Key Rotation Feature in CipherTrust Cloud Key Management madhav Thu, 11/13/2025 - 05:12 How Automated Key Management Empowers Customers and Elevates Data Protection Encryption ...

The browser is eating your security stack

Employees log into SaaS platforms, upload files, use AI tools, and manage customer data from a single tab. While the browser has become the enterprise’s main workspace, it remains largely outside the reach of security controls. According to the ...

News Alert: Gartner ranks ThreatBook a ‘strong performer’ in NDR for the third consecutive year

SINGAPORE, Nov. 13, 2025, CyberNewswire – ThreatBook, a global leader in threat intelligence-based cybersecurity solutions, today announced that for its Threat Detection Platform (TDP), it has been recognized as a Strong Performer in the 2025 ...

ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year

Singapore, Singapore, 13th November 2025, CyberNewsWire The post ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year ...

How Smart NHI Solutions Enhance Security Measures

How Does NHI Management Revolutionize Security Frameworks? Have you ever wondered why securing machine identities is as critical as protecting human identities? Non-Human Identities (NHIs), such as machine or application identities, play an ...

Ensuring Scalability in Your NHI Security Practices

Why Should Non-Human Identities (NHIs) Be Your Next Security Focus? Have you considered how Non-Human Identities (NHIs) fit into your organization’s cybersecurity strategy? Where cloud computing is omnipresent, securing NHIs is not just an ...

Creating Stability in NHI Management Across Multiple Clouds

How Can Organizations Achieve Stability in Managing Non-Human Identities Across Multiple Clouds? Where technology rapidly evolves and security threats become increasingly sophisticated, how can organizations ensure stability when managing ...

Confidently Managing Your NHIs’ Security Posture

Why is Managing Non-Human Identities Crucial for Your Organization’s Security Posture? Digital is continually evolving, and with it comes the increasing reliance on non-human identities (NHIs) to automate and streamline processes across various ...

Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken

At Security Field Day, Nile delivered a message that challenges decades of enterprise networking orthodoxy: the traditional Local Area Network architecture is fundamentally obsolete for modern security requirements. The problem isn’t subtle. ...

NDSS 2025 – Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China

SESSION Session 3A: Network Security 1 Authors, Creators & Presenters: Shencha Fan (GFW Report), Jackson Sippe (University of Colorado Boulder), Sakamoto San (Shinonome Lab), Jade Sheffey (UMass Amherst), David Fifield (None), Amir Houmansadr ...

NDSS 2025 – A Holistic Security Analysis Of Google Fuchsia’s (And gVisor’s) Network Stack

SESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Inon Kaplan (Independent Researcher), Ron Even (Independent Researcher), Amit Klein (The Hebrew University Of Jerusalem, Israel) --- PAPER --- You Can Rand but You Can't ...

Unprecedented Automation: IndonesianFoods Pits Open Source Against Itself

Over the past year, we've seen a steady drumbeat of supply chain incidents targeting npm — each slightly different, but collectively pointing to the same truth: the open source ecosystem is being stress-tested in real time. The post ...