Application Security News and Articles


What cloud-native solutions support effective NHI management?

Can cloud-native solutions revolutionize Non-Human Identities management? Effective Non-Human Identity management is vital. Often overlooked, these machine identities play a critical role. But can cloud-native solutions truly revolutionize this ...

How do I troubleshoot common issues with NHI automation?

Do NHIs and Secret Management Play a Vital Role in Cloud Security? If you’ve found yourself grappling with this question, you’re not alone. Machine identities, known as Non-Human Identities (NHIs), are swiftly gaining traction in the world of ...

What are the benefits of automating the NHI lifecycle in DevOps?

The Ongoing Challenge of Managing Non-Human Identities How can organizations bolster their cybersecurity plans and stay ahead of the game? One crucial strategy could be the efficient management of Non-Human Identities (NHIs). However, the task of ...

How can I secure NHIs in a multi-cloud environment?

Should You Be Worried About Securing Non-Human Identities In Multi-Cloud Environments? With the exponential rise of digitalization, securing Non-Human Identities (NHIs) in multi-cloud environments has become a crucial concern for various ...

The Silent Infiltration:  How Powerful CPS Devices Are Amplifying Cyber Risks for Businesses

The Internet of Things (IoT), also referred to as Cyber-Physical Systems (CPS) has exploded across all types of enterprises, promising greater efficiency, automation, and data-driven insights.  From smart sensors monitoring factory floors to ...

BSides Exeter 2024 – Blue Track – DFIR – Tracking TTP Changes Of SocGhoulish

Author/Presenter: Chris Morgan Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...

NIST SP 800-171 Rev 2 vs Rev 3: What’s The Difference?

Government cybersecurity and information security frameworks are a constant work in progress. Many different frameworks draw their requirements from the National Institute of Standards and Technology, and one of the most important documents for ...

Skybox Security: Migrating to a Better Alternative

On February 24, 2025, Skybox Security officially shut down operations, leaving its customers without support, updates, or future development. If your organization relied on Skybox for firewall policy management, security... The post Skybox ...

Symantec Uses OpenAI Operator to Show Rising Threat of AI Agents

Symantec threat researchers used OpenAI's Operator agent to carry out a phishing attack with little human intervention, illustrating the looming cybersecurity threat AI agents pose as they become more powerful. The agent learned how to write a ...

Imperva Protects Against the Apache Camel Vulnerabilities

Introduction: Understanding the Apache Camel Flaw On March 9, 2025, Apache released a security advisory for CVE-2025-27636, a vulnerability in the Apache Camel framework that allows attackers to bypass header filtering via miscased headers. ...

Google Second-Gen Chromecast and Audio Devices Hit By A Major Outage—Expired Intermediate CA Certificate to Blame

Google’s second-generation Chromecast and Chromecast Audio devices have been facing a widespread outage for the past five days. An expired intermediate CA certificate is said to be the cause of the outage. Recently, users of Google’s ...

Quantifying cyber risk strategies to resonate with CFOs and boards

In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a more strategic role within their organizations. He explains that aligning ...

How to Keep Kubernetes Infrastructure Running When You Lost Your SRE

Losing a Site Reliability Engineer (SRE) can be a serious challenge for organizations relying on Kubernetes. SREs are crucial for maintaining the reliability and performance of Kubernetes environments, ensuring that applications are easy to ...

BSides Exeter 2024 – Blue Track – DFIR – Digital Hostage: Navigating Ransomware Realities

Author/Presenter: Luke Weatherburn-Bird Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides ...

Reading the Data Breach Tea Leaves: Preventing Data Exfiltration Before it Happens 

Data exfiltration has traditionally been the end goal among threat actors whether it’s for financial gain, political gain or to simply wreak havoc. The post Reading the Data Breach Tea Leaves: Preventing Data Exfiltration Before it Happens  ...

Savings and Security: The Dual Benefits of FinOps and the Cloud

Organizations can adopt FinOps, a cloud financial management practice promoting shared accountability among engineering, finance and operations teams to balance innovation, security and cost efficiency. The post Savings and Security: The Dual ...

FCC Takes on China Threats with New National Security Council

The FCC is launching a new agency council to push back on Chinese-backed cyberthreats like Salt Typhoon by pushing telecoms to harden their defense, reduce their reliance on trade with foreign adversaries, and ensure continued U.S. leadership is ...

Strengthening Security in the Cloud Era Requires Network Visibility and Understanding

Organizations need a seamless, application-focused security strategy that integrates network, identity and data protection into a unified approach. The post Strengthening Security in the Cloud Era Requires Network Visibility and Understanding ...

Devnexus: Bringing Java Into The Age Of AI

The largest Java community conference, Devnexus 2025, tackled AI, security, and Java’s role in enterprise development. Read key takeaways for securing applications. The post Devnexus: Bringing Java Into The Age Of AI appeared first on Security ...

Cybersecurity Challenges in the Telecom Sector: Protecting Data and Infrastructure 

The telecommunications sector is the backbone of many processes in life and business and must improve its cybersecurity posture. The post Cybersecurity Challenges in the Telecom Sector: Protecting Data and Infrastructure  appeared first on ...