Application Security News and Articles


Empower Your Team Through Efficient NHIs Management

Why Should Businesses Prioritize NHIs Management? While human identities have consistently held the limelight in cybersecurity, a lesser-known, yet equally consequential, aspect is the management of non-human identities (NHIs). Of late, the ...

Improving NHIs Management in Your Organization

Is Your Organization Harnessing the Full Power of Non-Human Identities? The increasing reliance on automation and cloud computing in industries such as healthcare, financial services, and travel, has led to a surge in Non-Human Identities (NHIs). ...

Cato Networks Raises $359 Million to Expand SASE Business

Founded in 2015, the Tel Aviv based company has now raised more than $1 billion and claims more than 3,500 customers. The post Cato Networks Raises $359 Million to Expand SASE Business appeared first on SecurityWeek.

The Emerging Identity Imperatives of Agentic AI

4 min readAI agents are changing how identity and access work but most teams are unprepared. The post The Emerging Identity Imperatives of Agentic AI appeared first on Aembit. The post The Emerging Identity Imperatives of Agentic AI appeared ...

LinuxFest Northwest: See How Far COSMIC Has Come This Year

Authors/Presenters: Carl Richell (CEO And Founder, System76) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb ...

Escaping SOC Burnout: State of Security 2025

Michael Fanning, CISO at Splunk, shares insights on cybersecurity challenges highlighted in the Splunk State of Security report. Key issues include analyst burnout and alert fatigue, which persist over time. Fanning discusses how AI can improve ...

ICE’s Shiny New ‘AI’ Facial Recognition App: False Positives Ahoy!

Mobile Fortify: Liberty’s existential threat, or sensible way to ID illegal immigrants? The post ICE’s Shiny New ‘AI’ Facial Recognition App: False Positives Ahoy! appeared first on Security Boulevard.

Dell’s Comprehensive Approach to AI and the Dell AI Factory

Artificial intelligence (AI) is disrupting every industry, promising unprecedented innovation and efficiency. But that power requires responsibility, especially in the realm of cybersecurity. As businesses race to adopt AI, the question ...

Randall Munroe’s XKCD ‘Farads’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Farads’ appeared first on Security Boulevard.

How to Reduce Alert Fatigue in Cybersecurity

The post How to Reduce Alert Fatigue in Cybersecurity appeared first on AI Security Automation. The post How to Reduce Alert Fatigue in Cybersecurity appeared first on Security Boulevard.

Tackling Cloud Security Challenges in Runtime Environments

Rinki Sethi, chief security officer for Upwind, unpacks why runtime is the new battleground for cloud defense. Sethi traces her epiphany back to 2022, when she first heard that you can’t secure what you can’t see in real time. Configuration ...

Fraudsters behind €460 million crypto scam arrested in Spain

Spanish authorities arrested five members of a criminal network responsible for laundering €460 million stolen through global cryptocurrency investment fraud schemes. Source: Europol The operation, led by the Guardia Civil with support from ...

LinuxFest Northwest: Building An Auto-Updating, Containerized, Self-Hosted Identity Aware Reverse Proxy

Author/Presenter: Chris Beckman (Principal Security Engineer At Taxbit) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing ...

Going Beyond the Hype of DPDPA Compliance: Are You Breach Ready?

The Digital Personal Data Protection Act (DPDPA) marks a turning point for data privacy in India. Passed in 2023, the Act establishes a clear framework for the collection, processing, storage, and protection of personal data. For enterprises, it ...

AI Tools Transforming Business Operations in 2025

The AI revolution has reached a critical turning point, with 78% of organizations now using AI in at least one business function. This comprehensive guide examines the most impactful AI tools reshaping business in 2025, featuring emerging ...

NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO

NASA needs to perform an agency-wide cybersecurity risk assessment and to complete important cybersecurity tasks for each of its projects. The post NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO appeared first on SecurityWeek.

Sysdig Extends AI Agent Reach Across Portfolio

Sysdig has fully integrated an artificial intelligence (AI) agent across its cloud native application protection platform (CNAPP) to both identify and explain threats, along with remediation suggestions. The post Sysdig Extends AI Agent Reach ...

June Recap: New AWS Services and Privileged Permissions

As June 2025 wraps up, we’re back with another monthly roundup of AWS privileged permission changes and service updates that could reshape your cloud security posture. Each month brings a wave of new permissions — and with them, potential ...

Top 5 High-Risk CVEs of June 2025

Each month brings a flood of vulnerability disclosures. But only a few truly matter. The ones being exploited. The ones buried in critical systems. The ones that could take down... The post Top 5 High-Risk CVEs of June 2025 appeared first on ...

The Best Email Security Companies: Rankings and Reviews

The Best Email Security Companies: Rankings and Reviews Choosing an email security provider shouldn’t be this complicated. The market for email security vendors can be overwhelming. We get it. You’ve got AI-driven platforms, secure email ...