Application Security News and Articles


Xage Fabric prevents unauthorized access and sensitive data exposure

Xage Security has released zero trust platform designed to secure AI environments. Built on the same proven zero trust principles Xage uses to protect critical infrastructure, the platform delivers control over AI data access, tool usage, and ...

ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories

Advisories have also been published by Siemens, Schneider Electric, Phoenix Contact and CISA. The post ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories appeared first on SecurityWeek.

How to Protect Your Enterprise Against Account Takeover Attacks

At this very moment, there are at least 16 billion recently stolen login credentials available to hackers in various dark corners of the internet. That is, according to the Cybernews researchers who uncovered the massive breach, “a blueprint ...

Gigamon Insights delivers agentic AI for threat detection, compliance, and root-cause analysis

Gigamon has released Gigamon Insights, an agentic AI application purpose-built for network-derived telemetry that will deliver instant guidance for security and IT operations teams. Launching with integrations into SIEM and observability ...

Data Security in the Cloud: Best Practices for Protecting Your Business Insights

Protect your business insights with top cloud data security best practices. Learn encryption, access control, audits, backups, and compliance tips. The post Data Security in the Cloud: Best Practices for Protecting Your Business Insights appeared ...

DataLocker boosts data security with DL GO and MySafeConsole

DataLocker introduces DL GO, a secure and easy-to-use encrypted USB flash drive, alongside MySafeConsole, a lightweight cloud console that gives individuals and small teams centralized control, without enterprise cost. DL GO safeguards data with ...

Deepfakes are rewriting the rules of geopolitics

Deception and media manipulation have always been part of warfare, but AI has taken them to a new level. Entrust reports that deepfakes were created every five minutes in 2024, while the European Parliament estimates that 8 million will circulate ...

Garak: Open-source LLM vulnerability scanner

LLMs can make mistakes, leak data, or be tricked into doing things they were not meant to do. Garak is a free, open-source tool designed to test these weaknesses. It checks for problems like hallucinations, prompt injections, jailbreaks, and ...

Fixing silent failures in security controls with adversarial exposure validation

Organizations often operate as if their security controls are fully effective simply because they’re deployed, configured, and monitored. Firewalls are in place, endpoints are protected, and SIEM rules are running. All good, right? Not so ...

AI agents are here, now comes the hard part for CISOs

AI agents are being deployed inside enterprises today to handle tasks across security operations. This shift creates new opportunities for security teams but also introduces new risks. Google Cloud’s new report, The ROI of AI 2025, shows that ...

CISOs, stop chasing vulnerabilities and start managing human risk

Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025 CISO Risk Intelligence Survey, over 90 percent of incidents still originate from user behavior rather than ...

Flight Simulators for AI Agents — Practicing the Human-in-the-Loop

Simulators don’t just teach pilots how to fly the plane; they also teach judgment. When do you escalate? When do you hand off to air traffic control? When do you abort the mission? These are human decisions, trained under pressure, and just as ...

The Agentic Identity Sandbox — Your flight simulator for AI agent identity

We’ve all heard the promises about agentic AI transforming business operations. The reality? Most enterprise AI agent projects never make it past the pilot stage, and it’s not because the technology doesn’t work. The post The Agentic ...

Training for the Unexpected — Why Identity Simulation Matters More Than Unit Tests

Enterprises adopting agentic AI face their own black swans. Identity outages, token replay attacks, or rogue agents don’t happen every day, but when they do, the impact is massive and immediate. The problem is that most organizations still rely ...

Building an AI Pilot’s License — From Sandbox Hours to Production Readiness

Pilots don’t just train in simulators; they log hours and earn licenses. A private pilot needs a minimum number of simulator sessions before solo flight. Commercial pilots need even more. The process is standardized, measurable, and ...

TDL004 | Understanding Microsoft Zero Trust DNS with Aditi Patange

Summary In this episode, David Redekop and co host Francios Driessen interview Aditi Patange from Microsoft. The conversation focuses on the evolution of cybersecurity, on the development and importance of zero trust DNS and on Aditi’s journey ...

10 Questions CISOs Should Be Asking About File Security

The post 10 Questions CISOs Should Be Asking About File Security appeared first on Votiro. The post 10 Questions CISOs Should Be Asking About File Security appeared first on Security Boulevard.

How ADR Secures Against NPM Supply Chain Attacks | Application Detection and Response | Contrast Security

Contrast customers get certainty in moments when everyone else is guessing. When a code dependency supply-chain attack hits, they do not waste hours asking if they might be exposed. They know immediately whether their applications are running ...

Cisco Adds Bevy of AI Agents to Splunk Security Platform

Cisco at its Splunk .conf conference today added a series of artificial intelligence (AI) agents to its cybersecurity portfolio in addition to now making two editions of the Splunk Enterprise platform available. Ryan Fetterman, senior manager for ...

How to Stay Ahead in Secrets Sprawl Management

Why is Secrets Sprawl Management Crucial? How many organizations genuinely appreciate the importance of secrets management? Surprisingly fewer than expected. With the increasing proliferation of Non-Human Identities (NHIs) in modern networks, ...