Application Security News and Articles


Lightweight Open Source Identity Management Solutions for Home Labs

Discover lightweight, open-source identity management solutions perfect for securing your home lab. Compare Authelia, Authentik, and other tools to find the right fit. The post Lightweight Open Source Identity Management Solutions for Home Labs ...

Replacing Traditional Authentication Methods for Remote Access

Explore modern authentication methods for secure remote access, replacing outdated passwords and VPNs with MFA, passwordless, and ZTNA for enhanced security. The post Replacing Traditional Authentication Methods for Remote Access appeared first ...

How Can NHIs Ensure a More Secure Cloud?

Are You Fully Harnessing the Power of Non-Human Identities for Cloud Security? When pondering the intricate tapestry of cloud security, one might ask: Are non-human identities (NHIs) the missing link in your organization’s cybersecurity ...

Are Your Cloud Secrets Truly Protected?

How Are Non-Human Identities Shaping Cloud Security? What is the role of Non-Human Identities (NHIs) in fortifying cloud security, and how can organizations leverage these innovations to bolster data protection strategies? Cybersecurity practices ...

Optimistic Outlook for Cloud-Native Security Enhancements

How Secure Are Machine Identities in Your Cloud Environment? Managing machine identities, specifically Non-Human Identities (NHIs), is a daunting task for many organizations. These identities are machine-generated credentials that ensure secure ...

Get Excited About Innovations in Secrets Sprawl Control

Are You Embracing the Transformative Power of Non-Human Identities? Digital is evolving rapidly, and non-human identities (NHIs) are increasingly becoming integral to cybersecurity frameworks across various industries. But how are organizations ...

NDSS 2025 – BULKHEAD: Secure, Scalable, And Efficient Kernel Compartmentalization With PKS

SESSION Session 1D: System-Level Security Authors, Creators & Presenters: Yinggang Guo (State Key Laboratory for Novel Software Technology, Nanjing University; University of Minnesota), Zicheng Wang (State Key Laboratory for Novel Software ...

AI Meets Holidays: Helpful Tools, Best Deals and Security Tips

As we enter the holiday shopping season, more people are using AI tools and tips to shop for deals and protect themselves online. Here’s how. The post AI Meets Holidays: Helpful Tools, Best Deals and Security Tips appeared first on Security ...

Week in review: WSUS vulnerability exploited to drop Skuld infostealer, PoC for BIND 9 DNS flaw published

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Can your earbuds recognize you? Researchers are working on it Biometric authentication has moved from fingerprints to voices to facial scans, ...

Mendesain Arsitektur CI/CD untuk Organisasi Enterprise: Dari Branching Strategy hingga Approval…

Membangun CI/CD di level enterprise bukan sekadar membuat pipeline yang “jalan”, melainkan merancang sistem yang repeatable, terukur, aman…Continue reading on Medium »

A Walk in the Park

In August of 2024 I stopped in my local book shop (shoutout to The Raven Bookstore) as I often do to browse the shelves and see if there was anything I couldn't live without. A very colorful book jacket caught my eye. It was Kevin Fedarko's A ...

Ensuring Stability in Your Secrets Security Strategy

How Can Non-Human Identity Management Strengthen Your Secrets Security Strategy? How do organizations ensure robust security for their digital assets? The answer lies in strategic management of Non-Human Identities (NHIs) and secrets security. ...

Feel Supported with Expert IAM Guidance

How Does Non-Human Identity Management Shape Cybersecurity Strategies? What strategies should organizations adopt to shield themselves from the intricacies of cyber threats that arise from the management of Non-Human Identities (NHIs)? This ...

Freedom to Choose the Best Identity Solutions

How Secure Are Your Non-Human Identities? Organizations increasingly rely on machine identities, also known as Non-Human Identities (NHIs), to manage the complex web of interactions within their digital environments. But just how secure are these ...

Smart Strategies for Non-Human Identity Protection

How Does Non-Human Identity Management Boost Cybersecurity? Where digital transformation accelerates, how can organizations ensure robust security for non-human identities (NHIs)? Understanding NHIs is pivotal for businesses that aim to safeguard ...

NDSS 2025 – A Comprehensive Analysis of Rationales and Their Effects on Users’ Permission Decisions

Authors, Creators & Presenters: Yusra Elbitar (CISPA Helmholtz Center for Information Security), Alexander Hart (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security) PAPER The Power ...

The Twilio-Stytch Acquisition: A Watershed Moment for Developer-First CIAM

Twilio acquiring Stytch signals a major shift in developer CIAM. I've analyzed 20+ platforms—from Descope to Keyclock—to show you which deliver on Auth0's promise without the lock-in. OpenID standards, AI agent auth, and what actually matters ...

CMMC Media Sanitization Methods for NIST 800-88

Companies that need to comply with CMMC to earn their governmental contracts have a lot of work ahead of them. Securing their systems against intrusion and protecting data from breaches, malicious actors, and snooping is all part and parcel of ...

MY TAKE: Microsoft pitches an AI ‘protopian’ future — while civic groups pedal to stay upright

SEATTLE — At a well-meaning civic forum hosted inside a south Seattle community space yesterday (Oct. 30,) Microsoft’s Lorraine Bardeen coined a new term: protopian. Related: The workflow cadences of GenAI She said it three times, as if ...