Application Security News and Articles


Agentic AI and the risks of unpredictable autonomy

In this Help Net Security interview, Thomas Squeo, CTO for the Americas at Thoughtworks, discusses why traditional security architectures often fail when applied to autonomous AI systems. He explains why conventional threat modeling needs to ...

Trustifi Raises $25 Million for AI-Powered Email Security

Trustifi has raised $25 million in Series A funding to accelerate its product roadmap and go-to-market initiatives. The post Trustifi Raises $25 Million for AI-Powered Email Security appeared first on SecurityWeek.

Rethinking governance in a decentralized identity world

Decentralized identity (DID) is gaining traction, and for CISOs, it’s becoming a part of long-term planning around data protection, privacy, and control. As more organizations experiment with verifiable credentials and self-sovereign ...

CISOs need better tools to turn risk into action

Many organizations are overwhelmed by the complexity of their IT systems, making it difficult to manage cybersecurity risks, according to a new Ivanti report. The “Exposure Management: From Subjective to Objective Cybersecurity” ...

Photos: Infosecurity Europe 2025, part 2

Infosecurity Europe 2025 is a cybersecurity event taking place from June 3 to 5 in London. Help Net Security is on-site and here’s a closer look at the conference. The first gallery is here. The featured vendors are: Bitdefender, Qualys, ...

Stay Ahead of Identity Threats with Grip ITDR 2.0 | Grip

Prevent, detect, and respond to identity threats across all SaaS with Grip's ITDR 2.0 product. The post Stay Ahead of Identity Threats with Grip ITDR 2.0 | Grip appeared first on Security Boulevard.

The 6 identity problems blocking AI agent adoption in hybrid environments

AI agents are no longer just experiments — they’re becoming embedded in the way modern enterprises operate. From processing transactions to coordinating logistics, agents are increasingly acting on behalf of people and systems. But here’s ...

Choosing the Right Strategy for Secrets Sprawl

Is Your Organization Grappling with Secrets Sprawl? If you’re a cybersecurity professional, you’ve likely dealt with secrets sprawl at some point. This phenomenon occurs within organizations when multiple systems, applications, and services ...

Is Your Investment in IAM Justified?

What’s the Real Value of Your IAM Investment? For many organizations, Identity and Access Management (IAM) has been touted as the cornerstone of their cybersecurity strategy. But as a seasoned data management expert and cybersecurity specialist ...

Adapting to the Changing Landscape of NHIs Safety

Why is Adapting to Changes in NHIs Safety Crucial? One of the most important aspects often overlooked is the safety of Non-Human Identities (NHIs). With technology evolves, NHIs safety is also changing rapidly. It’s critical for organizations ...

Retail Under Siege

Why Security Fundamentals Matter More Than Ever   Victoria’s Secret became the latest high-profile retailer to fall victim to a cyberattack, joining a growing list of brands reeling from data breaches.... The post Retail Under Siege appeared ...

Improving Cost Efficiency with Karpenter 1.0: An Upgrade Guide

Karpenter has emerged as a game-changer for Kubernetes cluster management, offering dynamic node provisioning and cost optimization. Originally created to change how Kubernetes clusters are scaled and managed, Karpenter was intended to provide a ...

Discover First, Defend Fully: The Essential First Step on Your API Security Journey

APIs power today’s digital economy, but their lightning-fast evolution and astronomical call volumes can leave security teams scrambling to keep up. How can you secure what you can’t yet see or quantify? Imperva’s Unlimited Discovery-Only ...

Upgrading Splunk Universal Forwarders from the Deployment Server

One of the most requested features I hear from clients as a Splunk Managed Services Provider (MSSP) is to have a mechanism for managing the version of the Splunk Universal Forwarder across the environment from the Deployment Server.  We could ...

In The News | ManagedMethods Helps K-12 Schools With Launch of Advanced Phishing AI Solution

View the original press release on Newswire. ManagedMethods introduces first chain-of-thought (CoT) detection tool for K-12 schools BOULDER, Colo., June 3, 2025 (Newswire.com) – ManagedMethods, the leading provider of Google Workspace and ...

Unleashing Efficiency: Top Benefits of Data Center Tracking Software

Managing modern data centers is more challenging than ever, with growing complexities like hybrid environments and increasing demands for uptime and scalability. Data center tracking software offers real-time insights into assets, environmental ...

OffensiveCon25 – Frame By Frame, Kernel Streaming Keeps Giving Vulnerabilities

Authors/Presenters: Angelboy Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton ...

MY TAKE: Are we ‘Super f**ked’ by agentic AI — or finally able to take charge of what comes next?

When VC mogul Chris Sacca declared AI is the death knell for professional services, I flinched. Not because he’s wrong — but because it’s only half the story. Related:  GenAI grows up – at RSAC 2025 As a journalist who’s … (more…) ...

How to Conduct a Cybersecurity Compliance Audit in 6 Steps

The post How to Conduct a Cybersecurity Compliance Audit in 6 Steps appeared first on AI Security Automation. The post How to Conduct a Cybersecurity Compliance Audit in 6 Steps appeared first on Security Boulevard.

How DataDome Protected a Global Fintech Platform From a Week-Long Credential Stuffing Attack

DataDome blocked over 6.2 million credential stuffing attempts targeting a global fintech login, stopping a week-long attack without disruption or user impact. The post How DataDome Protected a Global Fintech Platform From a Week-Long Credential ...