Application Security News and Articles


Top Identity and Access Management Tools for 2025

Discover the leading Identity and Access Management (IAM) tools for 2025. Enhance security and streamline user management with our expert guide. The post Top Identity and Access Management Tools for 2025 appeared first on Security Boulevard.

Using Programmable Tokens for Secure Windows Login

Enhance Windows security using programmable tokens for multi-factor authentication. Learn how to set up and use hardware tokens for a more secure login process. The post Using Programmable Tokens for Secure Windows Login appeared first on ...

DigitalOcean Just Changed the Enterprise SSO Game Forever – And Every B2B Company Should Take Notice

When B2B companies don't provide SSO options, they're not just losing potential enterprise customers - they're actively hindering their existing customers' security and productivity. The post DigitalOcean Just Changed the Enterprise SSO Game ...

Relieve Your Security Team with Automated NHIs

Can Automated NHIs Bolster Your Cybersecurity? Non-Human Identities (NHIs) and secrets security management are gaining significant traction as vital players in enhancing the security posture. But, what exactly are NHIs and how can they relieve ...

Powerful Tools for Securing Non-Human Identities

Why is NHI Security a Top Priority in Today’s Business Landscape? The rapidly escalating cybersecurity threats are making organizations keen on fortifying their defenses. But are they considering the risk that lurks within their systems? Many ...

How Trust Centers and AI are replacing security questionnaires and accelerating B2B sales

Something strange happens in the final weeks of a sales quarter. No matter how aligned the stakeholders are, it often takes just one email to derail a deal: “Hey, before we proceed, our InfoSec team needs you to fill out this security ...

How to Pick the Right Authentication Solution for Your Growing Startup

Compare top authentication providers for growing startups. Learn which auth solution saves money, time, and improves user experience for 40k+ users. The post How to Pick the Right Authentication Solution for Your Growing Startup appeared first on ...

BSidesSF 2025: Slaying The Dragons: A Security Professional’s Guide To Malicious Packages

Creator, Author and Presenter: Kirill Boychenko Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Securing AI Models Against Adversarial Attacks in Financial Applications

The rapid adoption of artificial intelligence (AI) agents across industries has brought significant benefits but also increased exposure to cyber threats, particularly adversarial attacks. According to the Deloitte Threat Report, nearly 30% of ...

6 Best Practices for CMMC Physical Security Control

The first C in CMMC stands for cybersecurity, so it makes sense that the vast majority of content and information about it (both here and elsewhere online) is focused on the cyber aspect. Digital security makes up the bulk of the certification, ...

Get Reassured with Reliable Cloud NHI Practices

Does Your Cloud Security Strategy Include Reliable NHI Practices? Data safeguarding and secrets management are fundamental for any organization aiming for a secure infrastructure. Building a robust, cloud-based infrastructure relies heavily on ...

Feel Assured with Improved NHI Security Measures

How Assured Are You About Your Organization’s NHI Security? Non-Human Identities (NHIs) and their Secret Security Management have become a key focal point. But how confident are you in your organization’s current NHI security measures? With ...

Staying Ahead in Non-Human Identity Security

Can Non-Human Identity Security Give Your Business an Edge? Imagine where your machine identities and their “secrets” are managed with the proficiency of a seasoned cybersecurity specialist. Imagine if these identities, like tourists in a ...

Tabletop Exercises: Are They Worth It? (Yes)

“Fail. Fail fast.” How often, if at all, does your organization practice failing safely?  That’s the goal of a tabletop exercise. You simulate a cyber attack against your organization, not to win, but to expose security, communication, and ...

Palo Alto Networks Extends Scope and Reach of SASE Platform

Palo Alto Networks this week revealed it will update its secure access service edge (SASE) platform that adds an ability to identify and neutralize malware in real time as end users employ an enterprise-grade browser that is integrated into the ...

My Latest Book: Rewiring Democracy

I am pleased to announce the imminent publication of my latest book, Rewiring Democracy: How AI will Transform our Politics, Government, and Citizenship: coauthored with Nathan Sanders, and published by MIT Press on October 21. Rewiring Democracy ...

BSidesSF 2025: Can Cyber Mercenaries And Human Rights Coexist?

Creators, Authors and Presenters: Bill Marczak, Cooper Quintin, Eva Galperin Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. ...

Randall Munroe’s XKCD ‘Predicament’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Predicament’ appeared first on Security Boulevard.

Making Self-Service Password Reset and Account Recovery Secure

Self-service password reset (SSPR) and self-service account recovery (SSAR) are essential for reducing IT workload and empowering users. However, these solutions, if not implemented securely, can become an organization's biggest security hole. Up ...

Catalog the Crown Jewels: First Step in Breach Readiness

Yes, our worst nightmares are probably about to happen. WIRED has just reported that “The Era of AI-Generated Ransomware Has Arrived.” What’s more, the U.S.-based artificial intelligence (AI) company Anthropic admitted that its technology ...