Application Security News and Articles


What makes Non-Human Identities crucial for data security

Are You Overlooking the Security of Non-Human Identities in Your Cybersecurity Framework? Where bustling with technological advancements, the security focus often zooms in on human authentication and protection, leaving the non-human ...

NDSS 2025 – Secret Spilling Drive: Leaking User Behavior Through SSD Contention

Session 5D: Side Channels 1 Authors, Creators & Presenters: Jonas Juffinger (Graz University of Technology), Fabian Rauscher (Graz University of Technology), Giuseppe La Manna (Amazon), Daniel Gruss (Graz University of ...

2025: The Year Cybersecurity Crossed the AI Rubicon

How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there’s no going back. Here’s why. The post 2025: The Year Cybersecurity Crossed the AI Rubicon appeared first on Security ...

LGPD (Brazil)

What is the LGPD (Brazil)? The Lei Geral de Proteção de Dados Pessoais (LGPD), or General Data Protection Law (Law No. 13.709/2018), is Brazil’s comprehensive data protection framework, inspired by the European Union’s GDPR. It regulates ...

Week in review: 40 open-source tools securing the stack, invisible IT to be the next workplace priority

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 40 open-source tools redefining how security teams secure the stack Open source security software has become a key way for teams to get ...

Why are companies free to choose their own AI-driven security solutions?

What Makes AI-Driven Security Solutions Crucial in Modern Cloud Environments? How can organizations navigate the complexities of cybersecurity to ensure robust protection, particularly when dealing with Non-Human Identities (NHIs) in cloud ...

How does NHI support the implementation of least privilege?

What Are Non-Human Identities and Why Are They Essential for Cybersecurity? Have you ever pondered the complexity of cybersecurity beyond human interactions? Non-Human Identities (NHIs) are becoming a cornerstone in securing digital environments. ...

Can Agentic AI provide solutions that make stakeholders feel assured?

How Are Non-Human Identities Transforming Cybersecurity Practices? Are you aware of the increasing importance of Non-Human Identities (NHIs)? Where organizations transition towards more automated and cloud-based environments, managing NHIs and ...

How are secrets scanning technologies getting better?

How Can Organizations Enhance Their Cloud Security Through Non-Human Identities? Have you ever wondered about the unseen challenges within your cybersecurity framework? Managing Non-Human Identities (NHIs) and their associated secrets has emerged ...

NDSS 2025 – A Systematic Evaluation Of Novel And Existing Cache Side Channels

Session 5D: Side Channels 1 Authors, Creators & Presenters: Fabian Rauscher (Graz University of Technology), Carina Fiedler (Graz University of Technology), Andreas Kogler (Graz University of Technology), Daniel Gruss (Graz University of ...

2026 Will Be the Year of AI-based Cyberattacks – How Can Organizations Prepare?

Will the perception of security completely overturn with the exponential growth of AI in today’s technology-driven world? As we approach 2026, attackers upgrading to AI cyberattacks is no longer a possibility but a known fact. Let us examine ...

The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage

Turn XDR volume into revenue. Morpheus investigates 100% of alerts and triages 95% in under 2 minutes, letting MSSPs scale without adding headcount. The post The Autonomous MSSP: How to Turn XDR Volume into a Competitive Advantage appeared first ...

What New Changes Are Coming to FedRAMP in 2026?

One thing is certain: every year, the cybersecurity threat environment will evolve. AI tools, advances in computing, the growth of high-powered data centers that can be weaponized, compromised IoT networks, and all of the traditional vectors grow ...

Friday Squid Blogging: Giant Squid Eating a Diamondback Squid

I have no context for this video—it’s from Reddit—but one of the commenters adds some context: Hey everyone, squid biologist here! Wanted to add some stuff you might find interesting. With so many people carrying around cameras, we’re ...

What aspects of Agentic AI security should get you excited?

Are Non-Human Identities the Key to Strengthening Agentic AI Security? Where increasingly dominated by Agentic AI, organizations are pivoting toward more advanced security paradigms to protect their digital. Non-Human Identities (NHI) and Secrets ...

How do secrets rotations drive innovations in security?

How Critical is Managing Non-Human Identities for Cloud Security? Are you familiar with the virtual tourists navigating your digital right now? These tourists, known as Non-Human Identities (NHIs), are machine identities pivotal in computer ...

What are the best practices for ensuring NHIs are protected?

How Can Organizations Safeguard Non-Human Identities in the Cloud? Are your organization’s machine identities as secure as they should be? With digital evolves, the protection of Non-Human Identities (NHIs) becomes crucial for maintaining ...

How can effective NHIs fit your cybersecurity budget?

Are Non-Human Identities Key to an Optimal Cybersecurity Budget? Have you ever pondered over the hidden costs of cybersecurity that might be draining your resources without your knowledge? Non-Human Identities (NHIs) and Secrets Security ...

NDSS 2025 – KernelSnitch: Side Channel-Attacks On Kernel Data Structures

Session 5D: Side Channels 1 Authors, Creators & Presenters: Lukas Maar (Graz University of Technology), Jonas Juffinger (Graz University of Technology), Thomas Steinbauer (Graz University of Technology), Daniel Gruss (Graz University of ...

What Tech Leaders Need to Know About MCP Authentication in 2025

MCP is transforming AI agent connectivity, but authentication is the critical gap. Learn about Shadow IT risks, enterprise requirements, and solutions. The post What Tech Leaders Need to Know About MCP Authentication in 2025 appeared first on ...