Application Security News and Articles


RSAC 2025 Innovation Sandbox | Aurascape: Reconstructing the Intelligent Defense Line of AI Interactive Visibility and Native Security

Company Overview Aurascape is a cybersecurity startup founded in 2023 and headquartered in Santa Clara, California, USA. The company was co-founded by senior security experts and engineers from world-class technology companies such as Palo Alto ...

A Smarter Alternative to Entra Permissions Management

Microsoft has announced the retirement of Entra Permissions Management (formerly CloudKnox), with sales ending June 30, 2025. EPM offered valuable visibility into cloud permissions, helping teams identify overprivileged identities across AWS, ...

Cloud Infrastructure Security: Threats, Challenges & How to Protect Your Data 

As cloud environments become more complex, ensuring robust security for your cloud infrastructure is no longer an option, but a necessity.  The post Cloud Infrastructure Security: Threats, Challenges & How to Protect Your Data  appeared ...

Detectify Asset Classification and Scan Recommendations improves vulnerability testing

Detectify announced new Asset Classification and Scan Recommendations capabilities. This innovation directly addresses a critical challenge for security teams: knowing what else, beyond their core applications, requires in-depth testing. The new ...

Rubrik Identity Resilience protects vulnerable authentication infrastructure

Rubrik announced its upcoming solution, Identity Resilience, designed to secure the entire identity landscape alongside data. Identity Resilience aims to protect the most common entry points for attackers – human and non-human identities (NHIs) ...

BreachLock AEV simulates Real attacks to validate and prioritize exposures

BreachLock AEV automates multistep, threat-intelligence-led attack scenarios—helping security teams uncover real exposures and prioritize what matters most. Going beyond just showing security teams their risk, BreachLock Adversarial Exposure ...

Dashlane introduces Omnix for AI-powered credential protection

Dashlane unveiled a new approach to addressing human risk in response to the rise of AI-driven phishing attacks and shadow IT in corporate environments. Built on innovation that pushes beyond vault-based password management, Dashlane Omnix is ...

LastPass Secure Access Experiences simplifies access management

As cloud app adoption continues to rise, and the modern workplace continues to evolve, LastPass will introduce a new approach to democratize access management. Built with the needs of small-to-mid-sized businesses in mind, Secure Access ...

RSAC 2025 Innovation Sandbox | Knostic: Reshaping the Access Control Paradigm for Enterprise AI Security

Introduction As generative artificial intelligence (GenAI) and large language models (LLM) rapidly penetrate corporate operations, data leakage and privacy risks have become major challenges faced by enterprises. Knostic, a startup founded in ...

Vanta AI Security Assessment evaluates AI risk

Vanta announced new ways to help organizations demonstrate AI security and evaluate AI risk across their ecosystem. With the launch of Vanta’s new AI Security Assessment offering, customers using, developing or building with AI can now more ...

Security at Arm’s Length: Why the Lag Between Detection and Action Keeps Growing

Vulnerabilities: It's not their presence but their visibility and controlled management that defines secure development. The post Security at Arm’s Length: Why the Lag Between Detection and Action Keeps Growing appeared first on Security ...

Java and AWS Updates, Mayor’s Budget Cuts, and Floods in Indonesia

Stay updated with the latest in Java! Discover key updates from OpenJDK, Spring Framework, and AWS, plus critical news affecting the community. The post Java and AWS Updates, Mayor’s Budget Cuts, and Floods in Indonesia appeared first on ...

Flexible working models fuel surge in device theft

76% of respondents have been impacted by incidents of device theft in the past two years, with incidents more common in organizations with more flexible working models, according to Kensington. For instance, research revealed that 85% of ...

Exposure validation emerges as critical cyber defense component

Organizations have implemented various aspects of threat exposure validation, including security control validation (51%) and filtering threat exposures based on the effectiveness of security controls to mitigate threats (48%), according to ...

13 core principles to strengthen AI cybersecurity

The new ETSI TS 104 223 specification for securing AI provides reliable and actionable cybersecurity guidance aimed at protecting end users. Adopting a whole-lifecycle approach, the framework outlines 13 core principles that expand into 72 ...

Top must-visit companies at RSAC 2025

RSAC 2025 Conference is taking place at the Moscone Center in San Francisco from April 28 – May 1. With hundreds of booths, countless product demos, and nonstop buzz, navigating RSAC can be overwhelming. That’s why we’ve done the legwork to ...

New infosec products of the week: April 25, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Bitdefender, PowerDMARC, Skyhawk Security, Stellar Cyber, Swimlane, and Veracode. Email authentication simplified: How PowerDMARC makes DMARC effortless ...

Life in the Swimlane with Nikko Warford, Regional Sales Director

The post Life in the Swimlane with Nikko Warford, Regional Sales Director appeared first on AI Security Automation. The post Life in the Swimlane with Nikko Warford, Regional Sales Director appeared first on Security Boulevard.

Empowered by Better Secrets Vaulting

Why is Secrets Vaulting a Critical Component of Modern Cybersecurity? Several organizations have stepped up to embrace digital transformation, only to overlook a crucial aspect of cybersecurity- Non-Human Identities (NHIs) and Secrets Security ...

Feel Reassured with Enhanced Data Security

How Can We Mitigate Security Risks? Finding an answer to this pressing question is crucial. The answer often lies in focusing on enhanced data security. While organizations are transitioning to digitized platforms, protecting digital assets ...