Application Security News and Articles
Black Kite has unveiled the Adversary Susceptibility Index (ASI), a tool designed for TPRM teams to proactively identify which vendors are most vulnerable to specific threat actors before threats escalate into breaches. “With high-profile ...
Explore the top IAM platforms with MojoAuth. Ensure secure access and protect your enterprise with advanced identity and access management solutions.
The post Top IAM Platforms for Secure Access | MojoAuth appeared first on Security Boulevard.
Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas.
The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 2) appeared first on SecurityWeek.
In many automotive companies, the same systems-engineering teams are responsible for both safety and security. As a result, cybersecurity is treated as a subset of safety, undergirded by an implicit assumption: “If it’s safe, it must be ...
Adobe has released urgent security updates to resolve two AEM Forms vulnerabilities for which proof-of-concept (PoC) code exists.
The post Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC appeared first on SecurityWeek.
Learn how tutoring platforms protect student and parent logins with secure authentication like SSO, MFA, and adaptive login systems.
The post How Can Tutoring Platforms Protect Student and Parent Logins with Secure Authentication? appeared first ...
Cyware has released Cyware MCP Server (Model Context Protocol Server) to advance the future of AI-powered cyber defense. The new open-source capability is purpose-built to enable generative AI-native workflows, allowing seamless integration ...
Sysdig has unveiled an agentic cloud security platform. With Sysdig’s autonomous AI agents, designed to analyze cloud environments end to end and surface hidden business risks, organizations can remediate threats in minutes and deliver ...
Forter has launched Identity Monitoring for agentic commerce, the first in a series of new capabilities that enable ecommerce enterprises to recognize both bot and human behavior and confidently trust AI agents from discovery through payment. ...
Public sector organizations face rising cybersecurity, compliance, and operational challenges, especially in complex hybrid environments. Private certificate authorities (CAs) offer enhanced control, automation, and security tailored to internal ...
A leader’s guide on deploying AI agents – from selecting use cases and establishing governance, to safety controls and showing the value.
The post AI Agents in Cybersecurity: A Practical Roadmap for Leaders appeared first on Security Boulevard.
HPE announced expansion of its cybersecurity, resiliency, and compliance solutions, taking a multi-layered approach to protect enterprises through industry-leading data, network, and system security. HPE is introducing its combined secure ...
RedSeal unveiled RedSeal One, an AI-enabled exposure management platform designed to help organizations reduce risk, streamline operations, and strengthen resilience across hybrid environments. RedSeal One combines the company’s four ...
Searchlight Cyber has released a new AI capability that summarizes the activity of a threat actor in its dark web investigation platform, Cerberus. The Searchlight AI Agent uses the Cerberus’ dark web data lake to provide a quick overview of a ...
Concentric AI announced new integrations that enhance the AI-driven capabilities of its Semantic Intelligence data security governance platform, expanding data governance functionality for organizations. Concentric AI’s new integration with ...
ArmorCode announced application security and remediation advancements to help customers address risks posed by AI-generated code and applications, along with imminent compliance demands from regulations including the Cyber Resilience Act (CRA). ...
TP-Link has released the TL-WR3602BE, a high-performance Wi-Fi 7 travel router delivering speeds up to 3.6 Gbps. It features built-in VPN apps and multiple operating modes, making it a versatile choice for travel connectivity. Designed for ...
Cyber attackers are finding new ways in through the overlooked and unconventional network corners. Forescout’s 2025H1 Threat Review reveals a surge in advanced tactics, with zero-day exploits up 46 percent and ransomware attacks averaging ...
In this Help Net Security video, Kev Marriott, Senior Manager of Cyber at Immersive Labs, explores the challenges and opportunities of integrating AI into Security Operations Centers (SOCs). While AI can boost productivity by automating manual ...
Most security teams believe they can act quickly when a threat emerges. But many don’t trust the very data they rely on to do so, and that’s holding them back. A new Axonius report, based on a survey of 500 U.S.-based IT and security leaders, ...