Application Security News and Articles


Stay Calm: Your NHIs Are Protecting You

Can Your Non-Human Identities Keep You Calm When It Comes to Data Security? Maintaining a sense of calm security might seem like a tall order. However, the management of Non-Human Identities (NHIs) and Secrets can be a game-changer in achieving ...

BSidesLV24 – Proving Ground – Taking D-Bus To Explore The Bluetooth Landscape

Author/Presenter: Paul Wortman Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

How to get rid of deployment anxiety

No this is not therapy. We are talking about CI/CD here :)Continue reading on Level Up Coding »

How to get rid of deployment anxiety

No this is not therapy. We are talking about CI/CD here :)Continue reading on Medium »

Week in review: Critical SAP NetWeaver flaw exploited, RSAC 2025 Conference

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RSAC 2025 Conference RSAC 2025 Conference took place at the Moscone Center in San Francisco. Check out our microsite for related news, photos, ...

Why Ransomware Isn’t Just a Technology Problem (It’s Worse)

Ransomware isn’t a tech failure - it’s a market failure. If you think the hardest part is getting hacked, wait until the lawyers, insurers, and PR firms show up. The post Why Ransomware Isn’t Just a Technology Problem (It’s Worse) ...

Why NHIs Leave Security Experts Satisfied

Why is Satisfaction with NHIs Paramount in Security Expertise? When it comes to managing security, Non-Human Identities (NHIs) have become a critical focus for many CISOs and security professionals. This growing importance prompts the question: ...

Are Your NHIs Capable of Handling New Threats?

Are Your Non-Human Identities Prepared for Emerging Cybersecurity Threats? Understanding the readiness and response efficiency of your Non-Human Identities (NHIs) to new cybersecurity threats is crucial. This post seeks to shed light on the ...

Bsideslv24 – Proving Ground – Unleashing The Future Of Development: The Secret World Of Nix & Flakes

Author/Presenter: Jason Odoom Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

How to Handle CMMC Scoping for Remote Employees

CMMC mandates that companies working as part of the government supply line need to comply with a level of security determined by their handling of controlled information. Identifying the level of compliance necessary for your business is the ...

How NHIs Contribute to IT Stability

Why Are NHIs Crucial for IT Stability? How often do we consider Non-Human Identities (NHIs) and their role in IT stability? Many organizations are unaware of the strategic importance of NHI management. With more businesses adopt cloud-based ...

Being Proactive with NHIs in Cyber Defense

The Proactive Cyber Defense: Why Embrace NHIs? How often do you consider the role of Non-Human Identities (NHIs)? The significance of NHIs cannot be downplayed. Ensuring the security of these machine identities or NHIs is a cornerstone for a ...

Are Expenditures on NHI Justified?

Does Your Cybersecurity Strategy Justify NHI Costs? Organizations must frequently evaluate their strategies to ascertain if the costs of implementing and maintaining specific security measures are justified. The scenario is no different when it ...

BSidesLV24 – Proving Ground – You Can Be Neurodivergent And Succeed In InfoSec

Author/Presenter: Randall Wyatt Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Best Practices for User Authentication and Authorization in Web Applications: A Comprehensive Security Framework

In a world where credential breaches cost companies millions, strong authentication isn't optional—it's essential. This comprehensive guide breaks down seven critical domains of identity security into actionable strategies that protect your ...

Privacy for Agentic AI

Sooner or later, it’s going to happen. AI systems will start acting as agents, doing things on our behalf with some degree of autonomy. I think it’s worth thinking about the security of that now, while its still a nascent idea. In 2019, I ...

Enhancing EHR Security: Best Practices for Protecting Patient Data

In the digital healthcare landscape, electronic health records (EHRs) are foundational to patient care, operational efficiency and regulatory compliance. The post Enhancing EHR Security: Best Practices for Protecting Patient Data appeared first ...

The Cloud Illusion: Why Your Database Security Might Be at Risk

With the right cloud database architecture, you gain versatility as well as optimal security.  The post The Cloud Illusion: Why Your Database Security Might Be at Risk appeared first on Security Boulevard.

Preparing your business for a penetration test

Penetration testing is vital to keeping your business safe in today’s digital landscape, where cyber threats are ever present. It ensures your business’s sensitive data is protected, validating the robustness of the defensive measures your ...

BSidesLV24 – Proving Ground – And What If It Was Hacked? Tactics And Impacts Of Adversarial Machine Learning

Author/Presenter: Larissa Fonseca Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...