Application Security News and Articles


Who’s in your digital house? The truth about third-party access

In this Help Net Security video, Fran Rosch, CEO at Imprivata, discusses organizations’ challenges in securing third-party access and offers valuable insights on how businesses can address these risks effectively. A recent report conducted ...

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we ...

What are the cost implications of advanced NHI protection?

What is the True Cost of Not Investing in Non-Human Identities Protection? Non-Human Identities (NHIs) are increasingly significant where automated operations and cloud-based infrastructures dominate. But what happens when businesses overlook the ...

How do I measure the effectiveness of our NHI security measures?

A Perplexing Dilemma or a Solvable Query? Have you ever puzzled over how to measure the effectiveness of Non-Human Identities (NHIs) security in your organization? You understand the importance of NHIs. But quantifying their security ...

UK Cybersecurity Weekly News Roundup – 9 March 2025

Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. Microsoft Engineer's Transition to Cybersecurity Ankit Masrani, a 36-year-old software engineer, ...

BSides Exeter 2024 – Keynote: Matt Broomhall & Richard DeVere

Authors/Presenters: Matt Broomhall & Richard DeVere Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The ...

Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How QR code attacks work and how to protect yourself While QR codes are convenient, they also present significant risks. In the past few years, ...

How can NHI risks be reduced without compromising system performance?

Are your Non-Human Identities (NHIs) and Secrets effectively managed? NHIs and Secrets have emerged as crucial elements. However, the question looms: are these entities being effectively managed to reduce risks without compromising system ...

BSides Exeter 2024 – Keynote: Flushing Away Preconceptions Of Risk

Author/Presenter: Thom Langford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter ...

Cruel And Vindictive By Design

(This post originally published on 47 Watch) Recent administrative changes at the Social Security Administration (SSA) reveal a concerning pattern of decisions that disproportionately impact vulnerable populations while being implemented in ways ...

What are the best governance practices for managing NHIs?

What Drives the Need for Effective Non-Human Identities (NHIs) Governance Practices? Are we really addressing the potential dangers that lurk behind poorly managed non-human identities (NHIs)? With a sharp increase in the interconnectedness of ...

How can NHIs affect our overall threat landscape?

Are We Overlooking Non-Human Identities in Our Cybersecurity Strategy? How often do we give due consideration to the Non-Human Identities (NHIs)? The role of NHIs and their ‘secrets’ management in creating a robust and secure IT ...

How do I prioritize NHI risks in boardroom discussions?

Why is Risk Prioritization of Non-Human Identities Essential in Boardroom Discussions? Cybersecurity continues to command greater attention in organizational hierarchies, understanding the significance of Non-Human Identities (NHIs) risk ...

MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark Compliance Summit

Go inside the landmark Kaseya Compliance Summit, a unique event featuring industry experts focused on compliance challenges and opportunities for small business. The post MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark ...

BSides Exeter 2024 – Keynote: Become A Better Security Engineer (By Not Doing Security)

Author/Presenter: Kane Narraway Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...

‘Ban These Chinese Routers NOW,’ Cries House Committee

Sino stoppage scheme: TP-Link in crosshairs, along with other brands. The post ‘Ban These Chinese Routers NOW,’ Cries House Committee appeared first on Security Boulevard.

Guide: What is the CMMC-AB (Accreditation Body)?

Every year that goes by shows an improvement in technology, often by leaps and bounds over previous technology. What used to be the realm of far-off science fiction so unbelievably exotic that it defined genres is now a commonplace reality. With ...

AI Governance in AppSec: The More Things Change, The More They Stay the Same

Learn how AppSec teams can extend existing security and compliance practices seamlessly to AI. The post AI Governance in AppSec: The More Things Change, The More They Stay the Same appeared first on Security Boulevard.

US Seize Garantex in Cryptocurrency Money Laundering Bust

Two men linked to Garantex are accused of facilitating multi-billion dollar money laundering and sanctions violations. The post US Seize Garantex in Cryptocurrency Money Laundering Bust appeared first on SecurityWeek.