Application Security News and Articles


Microsoft Unveils Security Enhancements for Identity, Defense, Compliance

Microsoft announced new security capabilities for Defender, Sentinel, Copilot, Intune, Purview, and Entra.  The post Microsoft Unveils Security Enhancements for Identity, Defense, Compliance appeared first on SecurityWeek.

authID Mandate Framework establishes governance model for secure agentic AI deployment

authID unveiled the authID Mandate Framework, a comprehensive governance model for agentic AI security with support for non-human identities, including autonomous and semi-autonomous AI agents. Mandate provides enterprises with the trust ...

Nightfall’s AI File Classifier Detectors bring LLM intelligence to unstructured IP protection

Nightfall announced the launch of AI File Classifier Detectors, the first solution to use large language models (LLMs) to classify and protect business-critical documents that traditional DLP tools cannot see. Most high-value assets, including ...

CyberProof’s Agentic AI framework sets a new standard for flexible, threat-led defense

CyberProof has launched its new Agentic AI framework and SOC agents which are designed to improve threat detection, incident response, and operational efficiency for exposure and defense management. This framework is a key part of ...

F5 BIG-IP v21.0 accelerates enterprise AI initiatives

F5 introduced BIG-IP v21.0, giving customers a unified approach to app delivery, security, and scale in the AI era. This major release extends the F5 Application Delivery and Security Platform (ADSP) with a purpose-built delivery engine for ...

Bitwarden extends passkey login to Chromium-based browsers

Bitwarden announced expanded passkey login capabilities for Bitwarden browser extensions. The update enables users to access their vaults in Chromium-based browsers using a passkey instead of a master password, delivering a secure, ...

Google Email Deliverability: How to Avoid Spam Folders

Improve Google email deliverability and land in Gmail inboxes. Learn best practices and start optimizing your email performance today. The post Google Email Deliverability: How to Avoid Spam Folders appeared first on Security Boulevard.

Record-Breaking Cloud Incident Brings Outage Through the Internet

November 18, 2025 – Cloudflare Global Outage (not a DDoS) The timing and Cloudflare’s brief initial misdiagnosis caused widespread confusion, with many people incorrectly believing Cloudflare had been DDoSed. Some reports even mentioned that ...

The long conversations that reveal how scammers work

Online scammers often take weeks to build trust before making a move, which makes their work hard to study. A research team from UC San Diego built a system that does the patient work of talking to scammers at scale, and the result offers a look ...

Email Deliverability Consultant: How to Boost Campaign ROI

Find out what an email deliverability consultant does, key signs you need one, and how they help optimize email deliverability and engagement. The post Email Deliverability Consultant: How to Boost Campaign ROI appeared first on Security Boulevard.

Metis: Open-source, AI-driven tool for deep security code review

Metis is an open source tool that uses AI to help engineers run deep security reviews on code. Arm’s product security team built Metis to spot subtle flaws that are often buried in large or aging codebases where traditional tools struggle. ...

How to cut security tool sprawl without losing control

In this Help Net Security video, Jon Taylor, Director and Principal of Security at Versa Networks, talks about how organizations can deal with security tool sprawl. He explains why many teams end up with too many tools, especially as zero trust ...

Product showcase: Proton Pass, a password manager with identity protection

Managing passwords can be a real headache, and it’s still common to fall back on reusing them or storing them in a browser without much protection. Proton Pass, built by the Swiss company Proton AG (the team behind Proton Mail and Proton VPN), ...

How to Enable Safe File Handling for Clinical and Research Portals

The post How to Enable Safe File Handling for Clinical and Research Portals appeared first on Votiro. The post How to Enable Safe File Handling for Clinical and Research Portals appeared first on Security Boulevard.

Anthropic Disruption of an AI-Run Attack and What It Means for Agentic Identity

4 min readAnthropic’s recent disclosure of an AI-driven espionage campaign it halted represents less a new class of attack than a faster, more persistent version of patterns the industry has seen before. What distinguishes this incident is the ...

What is Single Sign-On and why do I need to create an account?

Understand Single Sign-On (SSO), its benefits, and why creating an account is still a crucial step for initial setup and enhanced security. Learn how SSO simplifies access while maintaining control. The post What is Single Sign-On and why do I ...

Comprehensive Guide to Risk-Based Authorization for Identity and Access Management

Learn how to implement risk-based authorization for enhanced security in identity and access management. Protect your applications from unauthorized access and data breaches. The post Comprehensive Guide to Risk-Based Authorization for Identity ...

4 U.S. Citizens, Ukrainian Plead Guilty in N. Korea IT Worker Scheme

Four U.S. citizens and a Ukrainian national pleaded guilty to their roles in a North Korean IT worker scam that victimized more than 135 U.S. companies and netted more than $2.2 million for the DPRK regime and is military and weapons ...

Can secrets vaulting offer a relaxed approach to data security

How Can Organizations Effectively Manage Non-Human Identities? What methods can organizations employ to securely manage non-human identities (NHIs) and secrets within their systems? This question is becoming increasingly pertinent. Companies ...

How certain can we be about cloud compliance with Agentic AI

Are Non-Human Identities the Missing Link in Cloud Security? Are we adequately equipping ourselves against emerging threats? This question underscores the strategic importance of managing Non-Human Identities (NHIs) – crucial to bridging gaps ...