Application Security News and Articles


Ensuring Stability in Your Secrets Security Strategy

How Can Non-Human Identity Management Strengthen Your Secrets Security Strategy? How do organizations ensure robust security for their digital assets? The answer lies in strategic management of Non-Human Identities (NHIs) and secrets security. ...

Feel Supported with Expert IAM Guidance

How Does Non-Human Identity Management Shape Cybersecurity Strategies? What strategies should organizations adopt to shield themselves from the intricacies of cyber threats that arise from the management of Non-Human Identities (NHIs)? This ...

Freedom to Choose the Best Identity Solutions

How Secure Are Your Non-Human Identities? Organizations increasingly rely on machine identities, also known as Non-Human Identities (NHIs), to manage the complex web of interactions within their digital environments. But just how secure are these ...

Smart Strategies for Non-Human Identity Protection

How Does Non-Human Identity Management Boost Cybersecurity? Where digital transformation accelerates, how can organizations ensure robust security for non-human identities (NHIs)? Understanding NHIs is pivotal for businesses that aim to safeguard ...

NDSS 2025 – A Comprehensive Analysis of Rationales and Their Effects on Users’ Permission Decisions

Authors, Creators & Presenters: Yusra Elbitar (CISPA Helmholtz Center for Information Security), Alexander Hart (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security) PAPER The Power ...

The Twilio-Stytch Acquisition: A Watershed Moment for Developer-First CIAM

Twilio acquiring Stytch signals a major shift in developer CIAM. I've analyzed 20+ platforms—from Descope to Keyclock—to show you which deliver on Auth0's promise without the lock-in. OpenID standards, AI agent auth, and what actually matters ...

CMMC Media Sanitization Methods for NIST 800-88

Companies that need to comply with CMMC to earn their governmental contracts have a lot of work ahead of them. Securing their systems against intrusion and protecting data from breaches, malicious actors, and snooping is all part and parcel of ...

MY TAKE: Microsoft pitches an AI ‘protopian’ future — while civic groups pedal to stay upright

SEATTLE — At a well-meaning civic forum hosted inside a south Seattle community space yesterday (Oct. 30,) Microsoft’s Lorraine Bardeen coined a new term: protopian. Related: The workflow cadences of GenAI She said it three times, as if ...

Reassuring Secrets Rotation for Compliance

How Do Non-Human Identities Impact Cloud Security? How do organizations ensure that their cloud are secure from potential threats? Non-Human Identities (NHIs) are critical components in cybersecurity, especially in cloud-based environments. These ...

Stay Relaxed with Enhanced Data Security

How Can Organizations Achieve Enhanced Data Security with Non-Human Identities? Have you ever wondered how modern organizations can achieve enhanced data security while maintaining efficient workflows? The management of Non-Human Identities ...

Powerful Tools to Manage Machine Identities

Why Are Non-Human Identities Critical in Cybersecurity? What happens when machine identities are not managed efficiently? Cybersecurity is rapidly transforming with increasing reliance on machine identities, also referred to as Non-Human ...

Preventing DNS filtering bypass by Encrypted DNS (DoT, DoH, DoQ)

DNS over HTTPS (DoH) and other encrypted DNS protocols like DNS over TLS (DoT) & DNS over QUIC (DoQ) enhances user privacy and security by encrypting DNS queries in transit, shielding them from eavesdropping, tampering, and censorship on ...

The Phishing Renaissance, How AI Brought Back the Classics

I've been giving talks lately about the evolution of phishing attacks - tracking them from the Nigerian Prince emails of 1993 all the way to today's deepfake video calls. It's a fun trip down memory lane, filled with AOL phishing scams and QR ...

Defending DNS with Infoblox and Protective DNS

For too long, we’ve treated DNS as a simple utility. It’s just a phonebook for the internet, right? Treating it that way is a mistake. Nearly every single malicious action, whether it’s a phishing link, a command-and-control ...

PhantomRaven: npm Malware Evolves Again

Published 3:00 p.m. ET on October 31, 2025; last updated 5:00 p.m. ET on October 31, 2025 This week, an open source malware campaign dubbed ‘PhantomRaven’ has run rampant, flooding the npm registry with over a hundred malicious packages that ...

NDSS 2025 – Was This You? Investigating the Design Considerations for Suspicious Login Notifications

Authors, Creators & Presenters: Sena Sahin (Georgia Institute of Technology), Burak Sahin (Georgia Institute of Technology), Frank Li (Georgia Institute of Technology) PAPER Was This You? Investigating the Design Considerations for Suspicious ...

Randall Munroe’s XKCD ‘Hot Water Balloon”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Hot Water Balloon” appeared first on Security Boulevard.

From Visibility to Action: How AI and Automation Are Reshaping Enterprise Security

Alan speaks with Shailesh Athalye, senior vice president of product management at Qualys, about how AI, automation, and integrated platforms are redefining the way enterprises approach cybersecurity and risk management. Athalye notes that many ...

Working Towards Improved PAM: Widening The Scope And Taking Control

Learn how GitGuardian supports expanding privileged access management to include non-human identities and improve secrets management across your infrastructure and vaults. The post Working Towards Improved PAM: Widening The Scope And Taking ...