Application Security News and Articles


Salt Security secures AI agent actions across enterprise APIs

Salt Security introduced a new solution designed to secure the actions AI agents take within the enterprise. As large organizations adopt agentic AI, agents are increasingly making real-time API calls through protocols like MCP and A2A, creating ...

Passwordless Authentication in Healthcare: Protecting Patient Data

Discover how passwordless authentication protects patient data, boosts compliance, and streamlines workflows in modern healthcare systems. The post Passwordless Authentication in Healthcare: Protecting Patient Data appeared first on Security ...

The Impact of Google’s JavaScript SERPs and AI Search on eCommerce Businesses

Google’s search engine results pages now require JavaScript, effectively “hiding” the listings from organic rank trackers, artificial intelligence models, and o The post The Impact of Google’s JavaScript SERPs and AI Search on eCommerce ...

Building security that protects customers, not just auditors

In this Help Net Security interview, Nir Rothenberg, CISO at Rapyd, discusses global differences in payment security maturity and the lessons that can be learned from leading regions. He points out that good engineering usually leads to strong ...

How AI is Transforming Compliance Management?

Compliance management has seen a major transformation over the years, shifting from manual, paper-heavy processes to technology-driven approaches. In the past, organizations depended heavily on paperwork and human oversight to stay compliant, a ...

Google introduces VaultGemma, a differentially private LLM built for secure data handling

Google has released VaultGemma, a large language model designed to keep sensitive data private during training. The model uses differential privacy techniques to prevent individual data points from being exposed, which makes it safer for handling ...

AI video surveillance could end privacy as we know it

AI-powered video surveillance brings up big questions about privacy. On one hand, it can make us feel safer, but on the other, it can easily cross the line into intrusion. The more we let technology watch and track our behavior, the harder it is ...

Improve Your Cyber Resilience with Data Security Platformization

Improve Your Cyber Resilience with Data Security Platformization madhav Tue, 09/16/2025 - 05:14 Data Security Lynne Murray | Director of Product Marketing for Data Security More About This Author > Today’s ...

Product showcase: Clean Links exposes what’s hiding behind a QR code

Clean Links is a handy app that shows you exactly where a link will take you before you click it. It strips out trackers, expands shortened URLs, and helps you avoid scams while saving you time and frustration. The best part? There’s no sign-up ...

OT security needs continuous operations, not one-time fixes

Cyberattacks keep hitting the OT systems that critical infrastructure operators run, according to new research from Forrester. In a survey of 262 OT security decision-makers, 91% reported at least one breach or system failure caused by a ...

Cybersecurity jobs available right now: September 16, 2025

CISO Haier Europe | Italy | On-site – View job details As a CISO, you will develop an information security strategy aligned with organizational priorities, secure executive support, and oversee the protection of data, intellectual ...

Why Security-Minded Teams Are Turning to Hardened Linux Distributions

In conversations about operating system security, “compliance” tends to dominate. But for those of us responsible for keeping infrastructure secure—whether facing STIG implementations, CIS benchmark requirements, or FedRAMP ...

Empower Your Operations with Enhanced NHIDR

Are You Leveraging the Power of Enhanced NHIDR in Your Operations? You are undoubtedly aware of the critical role that advanced data protection methodologies play in fortifying our digital operations. But have you harnessed the full potential of ...

Cost-Effective NHI Solutions That Fit Your Budget

Are Cost-Effective NHI Solutions a Reality? Cybersecurity constantly presents new challenges, particularly to organizations operating in a cloud environment. With companies grapple with managing Non-Human Identities (NHIs) and their associated ...

The Gravity of Process: Why New Tech Never Fixes Broken Process and Can AI Change It?

Let’s tackle the age old question: can new technology fix broken or missing processes? And then let’s add: does AI and AI agents change the answer you would give? Gemini illustration based on this blog This is the question which I recently ...

Just a test

Just a test The post Just a test appeared first on Security Boulevard.

DEF CON 33: Ch0wn35

Creators, Authors and Presenters: d3dbot, Ch0wn35 Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las ...

689,000 Affected by Insider Breach at FinWise Bank

A former FinWise employee gained access to American First Finance customer information. The post 689,000 Affected by Insider Breach at FinWise Bank appeared first on SecurityWeek.

Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle

Fifteen years after its debut, Zero Trust remains the gold standard in cybersecurity theory — but its uneven implementation leaves organizations both stronger and dangerously exposed. The post Zero Trust Is 15 Years Old — Why Full Adoption Is ...

20 Most Popular Developer Tools in 2025

Explore 20 essential developer tools for coding, collaboration, and project management in 2025. Find practical solutions to elevate your workflow and boost success. The post 20 Most Popular Developer Tools in 2025 appeared first on Security ...