Application Security News and Articles


The Growing Compliance Burden for GRC Teams

The post The Growing Compliance Burden for GRC Teams appeared first on AI Security Automation. The post The Growing Compliance Burden for GRC Teams appeared first on Security Boulevard.

Understanding IAM vs CIAM: A Comprehensive Guide to Identity Management Systems

The distinction between IAM and CIAM reflects the fundamental differences between managing internal organizational resources and serving external customers in the digital age. While both share common identity management principles, their ...

Defending Your Cyber Castle, Part 1: Building the Walls, Moat & Drawbridge of K-12 Security

In a recent webinar, two expert K-12 technology leaders—Glen Drager, Network System Administrator at Tyrone Area School District, and Chris Rowbotham, Director of Technology at Siuslaw School District—joined ManagedMethods’ CRO David Waugh ...

Unlock Powerful Capabilities in Secrets Rotation

Uncover the Hidden Power of Secrets Rotation Have you ever pondered the security capabilities encrypted deep within your cloud environment? Among the most formidable tools is secrets rotation, a strategy that revolves around replacing ...

Lessons from the 23andMe Breach and NIST SP 800-63B

Preventing Credential Stuffing Introduction In 2023, personal genomics company 23andMe suffered a major data breach that exposed sensitive genetic and personal information of nearly 7 million people. The breach was ultimately traced to a ...

Cyber Risk Management Strategy: How to Plan

Online threats are everywhere, and no organization is safe from them. Whether it’s stolen data, ransomware, or phishing, attacks are becoming more frequent and severe. That’s why having a clear... The post Cyber Risk Management Strategy: How ...

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks

The Iranian government has sharply restricted internet access in the country following almost a week of Israeli airstrikes and a cyberattacks on an Iranian bank and cryptocurrency exchange by a pro-Israeli hacker group called Predatory ...

LinuxFest Northwest: Your First Game In Godot

Author/Presenter: Oscar Baechler, MA (Author @ Packt Publishing, Professor, Lake Washington Institute of Technology) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), ...

Russian Hackers Bypass Gmail MFA with App Specific Password Ruse

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords. The post Russian Hackers Bypass Gmail MFA with App Specific Password Ruse appeared first on SecurityWeek.

OAuth and Agentic Identity: The Foundation for Zero Trust AI—and What’s Next

AI agents are no longer theory—they’re live, autonomous actors making decisions, calling APIs, and driving transactions across multi-cloud environments. As enterprises shift from predictive to proactive AI, identity must keep up with AI’s ...

The Identity Problem at AI Scale: Why Agentic AI Demands More From OAuth

AI agents aren’t theoretical anymore. They’re active in our enterprises—making decisions, chaining API calls, interacting across clouds, and operating autonomously at machine speed. But as organizations move from predictive AI to proactive, ...

Common SSO Vulnerabilities and Mitigations: Protecting Your Authentication Flow

Implement comprehensive monitoring for your SSO systems that can detect both successful attacks and attempted attacks. Look for patterns like unusual geographic distribution of login attempts, high numbers of authentication failures, or ...

Threat actor Banana Squad exploits GitHub repos in new campaign

Trends in open-source software supply chain attacks – ones that exploit the public platforms developers rely on for software development – have changed quite a bit in recent years. While the number of malicious packages uploaded to ...

AWS Extends Scope of Cybersecurity Alliance with CrowdStrike

Amazon Web Services (AWS) and CrowdStrike this week expanded their alliance to include an incident response that is now available on the Amazon Web Services (AWS) marketplace. Announced at the AWS re:Inforce 2025 conference, the Falcon for AWS ...

Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection

Misconfigured permissions in Google’s Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects. The post Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection appeared ...

Halo Security Honored with 2025 MSP Today Product of the Year Award

Miami, Florida, 18th June 2025, CyberNewsWire The post Halo Security Honored with 2025 MSP Today Product of the Year Award appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Good Science’

Permalink The post Randall Munroe’s XKCD ‘Good Science’ appeared first on Security Boulevard.

The Hidden Threat to Retention: Slow File Security

The post The Hidden Threat to Retention: Slow File Security appeared first on Votiro. The post The Hidden Threat to Retention: Slow File Security appeared first on Security Boulevard.

Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road

PAFACA Pause Persists: Won’t somebody PLEASE think of the children? The post Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road appeared first on Security Boulevard.

Identity Intelligence: The Front Line of Cyber Defense

Identity is the connective tissue of today’s enterprise. But with identity comes exposure. Credentials are being stolen, resold, and reused across the cybercriminal underground at a scale that far outpaces traditional defenses. Identity ...