Application Security News and Articles


Thales Named an Overall Leader in 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management

Thales Named an Overall Leader in 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management madhav Thu, 05/08/2025 - 06:31 We’re proud to share that Thales has been recognized as an Overall Leader in the 2025 KuppingerCole ...

Do the Math: Prime Number Breakthrough Could Upend Encryption 

When Way Kuo, a senior fellow at the Hong Kong Institute for Advanced Study, claimed in a working paper appearing in the SSRN Electronic Journal that his team had “devised a way to accurately and swiftly predict when prime numbers will ...

How agentic AI and non-human identities are transforming cybersecurity

Within the average enterprise, non-human identities (NHIs) now outnumber employees, contractors, and customers by anything between 10-to-1 and 92-to-1. Add to this the fragmentation of human identity management resulting from authorizing a single ...

Even the best safeguards can’t stop LLMs from being fooled

In this Help Net Security interview, Michael Pound, Associate Professor at the University of Nottingham shares his insights on the cybersecurity risks associated with LLMs. He discusses common organizational mistakes and the necessary precautions ...

Wave of tech layoffs leads to more job scams

The tech industry is experiencing significant layoffs, leaving thousands of IT and cybersecurity professionals in search of new employment opportunities. Unfortunately, as these individuals search for new opportunities, scammers are actively ...

Phishing-Resistant MFA: Why FIDO is Essential

Phishing-Resistant MFA: Why FIDO is Essential madhav Thu, 05/08/2025 - 04:47 Phishing attacks are one of the most pervasive and insidious threats, with businesses facing increasingly sophisticated and convincing attacks that exploit human ...

Global cybersecurity readiness remains critically low

Only 4% of organizations worldwide have achieved the ‘mature’ level of readiness required to withstand cybersecurity threats, according to Cisco’s 2025 Cybersecurity Readiness Index. This is a slight increase from last year’s ...

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts

Healthcare organizations are facing a growing data security challenge from within, according to a new report from Netskope Threat Labs. The analysis reveals that employees in the sector are frequently attempting to upload sensitive information, ...

Cyberattacks on Critical Infrastructures Makes Us Very Vulnerable

  Many don’t realize that cyberattacks against Critical Infrastructure sectors, can cause more than an inconvenience of a temporary power outage.   Critical Infrastructures are a favorite of aggressive Nation State cyber threats.  In ...

How NHIs Support Your Security Goals

Why Do You Need Non-Human Identities for Your Security Goals? Companies are increasingly turning their attention towards the realm of Non-Human Identities (NHIs) to bolster the fortifications around their cyber territories. My role involves ...

Feeling Assured by Your NHI Policies

Do Your NHI Policies Offer Assurance? Of course, when it comes to securing our cloud, we’re always looking for that feeling of assurance. The critical question is, can we be truly assured by our Non-Human Identities (NHIs) and Secrets Security ...

How Empowered NHIs Transform Cloud Security

Are NHIs the Game Changer in Cybersecurity? Imagine being able to transform your organization’s cloud security strategy with NHI’s empowered technology. Non-Human Identities (NHIs) promise to do just that. So, how does this seemingly complex ...

The ITDR Imperative: Securing Active Directory

ITDR is the next stage in enterprise security as attackers increasingly target credentials.. However, while the industry discusses ITDR at length, one fact continues to be overlooked: Any serious ITDR strategy must begin with protecting the user ...

Breaking the Password Barrier: FIDO’s Path to Seamless Security

As the digital world rapidly expands, the need for secure, seamless authentication becomes more urgent. At the forefront of this evolution is FIDO (Fast Identity Online), promoting password-less authentication that combines convenience with ...

Why Identity Signals Are Replacing IOCs in Threat Intelligence

The CISO’s View: Too Many Alerts, Too Little Context Imagine a SOC analyst under pressure. Their screen is filled with IP addresses, malware hashes, geolocations, login alerts, and thousands of other signals. It’s a flood of noise. IOCs used ...

Integrating SAST Tools with DefectDojo in a Kubernetes-Based CI/CD Pipeline

After several technical discussions within our engineering team, we decided to enhance our CI/CD pipeline security by integrating three…Continue reading on Medium »

BSidesLV24 – Proving Ground – Building A Security Audit Logging System On A Shoestring Budget

Author/Presenter: George Wang Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Tech Talk- AI Engine: A look at Transformative AI for Deep Insight into Anomalous Traffic

Graph-based anomaly detection transforms how network operators uncover threats and service issues by providing a deeper, relationship-driven understanding of all network activity traversing the eco-system. Unlike traditional methods that analyze ...

Early 2025 DDoS Attacks Signal a Dangerous Trend in Cybersecurity

As we enter 2025, the threat landscape continues to evolve, with Distributed Denial of Service (DDoS) attacks growing in both scale and sophistication. So far this year, we’ve already seen several major DDoS attacks over 5 million Requests Per ...

Randall Munroe’s XKCD ‘About 20 Pounds’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘About 20 Pounds’ appeared first on Security Boulevard.