Application Security News and Articles


Passwordless adoption moves from hype to habit

With the average person juggling more than 300 credentials and credential abuse still the top attack vector, the password’s decline is long overdue. Across every major sector, organizations are changing how users log in, and new data shows the ...

The secret to audit success? Think like your auditor

In this Help Net Security video, Doug Kersten, CISO at Appfire, shares practical, experience-driven advice on how CISOs can avoid the most common mistakes when preparing for an audit. He breaks down what often frustrates auditors, why ...

Infosec products of the month: October 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Acronis, Akeyless, Axoflow, Blumira, Cayosoft, Confluent, Corelight, Elastic, Illumio, Legit Security, Netscout, NowSecure, Nozomi Networks, Palo Alto ...

Flight Simulators for AI Agents — Practicing the Human-in-the-Loop

Simulators don’t just teach pilots how to fly the plane; they also teach judgment. When do you escalate? When do you hand off to air traffic control? When do you abort the mission? These are human decisions, trained under pressure, and just as ...

Building an AI Pilot’s License — From Sandbox Hours to Production Readiness

Pilots don’t just train in simulators; they log hours and earn licenses. A private pilot needs a minimum number of simulator sessions before solo flight. Commercial pilots need even more. The process is standardized, measurable, and ...

Training for the Unexpected — Why Identity Simulation Matters More Than Unit Tests

Enterprises adopting agentic AI face their own black swans. Identity outages, token replay attacks, or rogue agents don’t happen every day, but when they do, the impact is massive and immediate. The problem is that most organizations still rely ...

Secrets Management That Fits Your Budget

How Can Effective NHI Management Transform Your Cybersecurity Strategy? How can organizations efficiently manage secrets and non-human identities (NHIs) while maintaining a budget-friendly approach? This question is particularly vital for ...

Satisfied with Your Secrets Vaulting Approach?

Are You Really Satisfied with Your Secrets Vaulting Approach? How confident are you in your current secrets vaulting strategies? Where organizations increasingly rely on digital processes, the management of Non-Human Identities (NHIs) and their ...

Improving NHI Lifecycle Management Continuously

What is the True Cost of Overlooking Non-Human Identities? When organizations increasingly move operations to the cloud, the spotlight is now on securing machine identities, also known as Non-Human Identities (NHIs). But what happens when these ...

Independent Control Over Cloud Identities

How Secure Are Your Cloud-Based Non-Human Identities? What measures are you taking to ensure the security of your cloud-based systems? Managing Non-Human Identities (NHIs) has become a critical focus for diverse sectors, including financial ...

Responding to Breaches: How NSPM Accelerates Incident Containment

When a breach happens, seconds matter. Every moment between detection and containment gives an attacker time to move laterally, exfiltrate data, or escalate privileges. Yet, most organizations still rely on... The post Responding to Breaches: How ...

OpenAI’s Aardvark is an AI Security Agent Combating Code Vulnerabilities

OpenAI on Thursday launched Aardvark, an artificial intelligence (AI) agent designed to autonomously detect and help fix security vulnerabilities in software code, offering defenders a potentially valuable tool against malicious hackers. The ...

Enterprise browsers – when your regular browser’s security just isn’t good enough

Your regular browser may not be secure enough for modern threats, enterprise browsers can help. The post Enterprise browsers – when your regular browser’s security just isn’t good enough appeared first on SecureIQ Lab. The post Enterprise ...

NDSS 2025 – UI-CTX: Understanding UI Behaviors With Code Contexts For Mobile Applications

SESSION Session 1C: Privacy & Usability 1 Authors, Creators & Presenters: Jiawei Li (Beihang University & National University of Singapore), Jiahao Liu (National University of Singapore), Jian Mao (Beihang University), Jun Zeng ...

2-Legged vs 3-Legged OAuth: Which Flow Fits Your Use Case?

6 min readLearn when to use 2-legged vs 3-legged OAuth flows for your authentication needs. Discover security vulnerabilities, implementation patterns, and how Workload Identity Federation eliminates credential risks. The post 2-Legged vs ...

US Defense Contractor Boss Sold Zero Days to Russia — Cops a Plea

So long and thanks for all the fish: Peter Williams admits to selling unpatched iPhone bugs to a shady Russian broker. The post US Defense Contractor Boss Sold Zero Days to Russia — Cops a Plea appeared first on Security Boulevard.

Your Enterprise LAN Security Is a Problem—Nile Can Fix It

For decades, the Local Area Network (LAN) has been the neglected, insecure backyard of the enterprise. While we’ve poured money and talent into fortifying our data centers and cloud environments, the LAN has remained a tangled mess of ...

Is Unsupported OpenJDK for Universities Good Enough?

Institutions wondering whether to pay Oracle must decide whether unsupported OpenJDK for universities is good enough. The post Is Unsupported OpenJDK for Universities Good Enough? appeared first on Azul | Better Java Performance, Superior ...

Veeam Sets Data Graph Course Following Acquisition of Securiti AI

Veeam Software plans to expand the scope of its offerings into the realm of data security posture management (DSPM) following the closing of a $1.725 billion acquisition of Securiti AI. Securiti AI developed a DSPM platform based on a knowledge ...

Which Industries Are Most & Least Protected from Bad Bots & Unwanted AI Traffic in 2025

Explore key findings from DataDome’s Global Bot Security Report, including which industries are least and most protected against bad bots and unwanted AI traffic in 2025 and beyond. The post Which Industries Are Most & Least Protected from ...