Application Security News and Articles


Independent Verification of NHI Security: Necessary?

Why Is Independent Verification of Non-Human Identities Crucial for Cybersecurity? When it comes to cybersecurity, how often do organizations think about their machine identities, often overlooked yet vital for robust security protocols? The ...

How Safe Are Your Non-Human Identities Really?

Are You Harnessing the Full Potential of Non-Human Identities in Your Cloud Security Strategy? Non-human identities (NHIs) are revolutionizing the approach to cybersecurity strategy, particularly for organizations navigating the complexities of ...

News alert: Lightship, OpenSSL submit OpenSSL 3.5.4 — with post-quantum crypto on board

NEWARK, N.J., October 9, 2025, CyberNewswire — Lightship Security, an Applus+ Laboratories company and accredited cryptographic security test laboratory, and the OpenSSL Corporation, the co-maintainer of the OpenSSL Library, announce the ...

Secrets Sprawl is Killing DevOps Speed – Here’s How to Fix It

5 min readHard-coded secrets and credential sprawl slow DevOps teams by hours daily. Learn how identity-based access management eliminates secrets and boosts speed. The post Secrets Sprawl is Killing DevOps Speed – Here’s How to Fix It ...

USENIX 2025: From Existential To Existing Risks Of Generative AI: A Taxonomy Of Who Is At Risk, What Risks Are Prevalent, And How They Arise

Creators, Authors and Presenters: Megan Li and Wendy Bickersteth, Carnegie Mellon University And In Collaboration With Ningjing Tang, Jason Hong, Hong Shen, Hoda Heidari, and Lorrie Cranor Our thanks to USENIX for publishing their Presenter’s ...

Simplifying IAM Migrations: Lessons for Hybrid Enterprises

6 min readStreamline IAM migration from Active Directory to Azure with policy-driven access, workload identity federation, and zero-trust security for hybrid enterprises. The post Simplifying IAM Migrations: Lessons for Hybrid Enterprises ...

Rogue agents: When your AI decides it knows better

Left unchecked, agents will escalate permissions, chain tokens, and quietly gain more access than intended. They aren’t “malicious” — they’re opportunistic. The post Rogue agents: When your AI decides it knows better appeared first on ...

Over-scoped agents: The permission sprawl that will end you

Every engineering team is spinning up agents. And they're all over-scoped because nobody wants to be the person whose agent doesn't work. The post Over-scoped agents: The permission sprawl that will end you appeared first on Strata.io. The post ...

Blind spots: Your agents are operating in complete darkness (and so are you)

Traditional IAM logs were built for humans clicking buttons. Your agents are executing complex decision trees at machine speed. It's like trying to track Formula 1 with a sundial. The post Blind spots: Your agents are operating in complete ...

Human-in-the-loop: When your AI’s creativity becomes your legal liability

Here's the truth nobody wants to admit: Your autonomous agents are making promises right now that you don't know about, can't afford, and will be legally forced to honor. The post Human-in-the-loop: When your AI’s creativity becomes your legal ...

Agent credential replay: Why bearer tokens are digital cash in a tornado

Here's what should keep you up at night: Your agents are passing these digital IOUs to each other thousands of times per second. Each handoff is an opportunity for theft, confusion, or replay. The post Agent credential replay: Why bearer tokens ...

Randall Munroe’s XKCD ‘’Piercing”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Piercing” appeared first on Security Boulevard.

It’s a Partnership, Not a Handoff: Doug McLaughlin on Navigating Enterprise Change

The journey from a signed contract to a fully deployed security solution is one of the most challenging in enterprise technology. For a mission-critical function like identity, the stakes are even higher. It requires more than just great ...

USENIX 2025: PEPR ’25 – Using GenAI to Accelerate Privacy Implementations

Creators, Authors and Presenters: Rituraj Kirti, Software Engineer - Meta & Rajkishan Gunasekaran, Software Engineer - Meta Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the ...

The Psychology of Security: Why Users Resist Better Authentication

70% of Americans feel overwhelmed by passwords, yet only half choose secure ones despite knowing the risks. The problem isn't user education—it's psychology. Discover why users resist better authentication and the UX design principles that make ...

In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Other noteworthy stories that might have slipped under the radar: US universities targeted by payroll pirates, Zimbra vulnerability exploited, Mic-E-Mouse attack. The post In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ...

OpenVPN redefines secure connectivity with Access Server 3.0

OpenVPN released Access Server 3.0, a major update to its self-hosted business VPN solution that delivers foundational improvements to performance, flexibility, and system integration. While the most visible change is a modernized Admin Web UI, ...

Accenture helps organizations advance agentic AI with Gemini Enterprise

Accenture and Google Cloud announced that their strategic alliance is driving client reinvention with Gemini Enterprise agentic AI solutions, building on the successful adoption of Google Cloud technologies for organizations across industries. ...

Proof launches Certify, the cryptographic answer to AI-generated fraud

Generative AI is enabling the proliferation of fake documents, images, videos, and data at an unprecedented scale, to the point where it’s indistinguishable from reality. While fake media and misinformation have garnered the most attention, the ...

comforte AG debuts TAMUNIO, its all-in-one shield for data security

comforte AG launched TAMUNIO, a unified data security platform designed to reduce risk, accelerate innovation with cloud and AI, and optimize operational costs for the most demanding enterprises. Built on decades of experience securing ...