Application Security News and Articles


What’s OpenID Connect (OIDC) and Why Should You Care?

Alright, let’s be honest — login systems are everywhere. From your favourite pizza delivery app to your office tools, every app asks you to Sign in with Google or Log in with Microsoft. Ever wondered how that works under the hood? That’s ...

Amazon Linux 2023 achieves FIPS 140-3 validation

Amazon Linux 2023 (AL2023) has earned FIPS 140-3 Level 1 validation for several of its cryptographic modules. This means it’s now approved for use in systems that need to meet U.S. and Canadian government standards for encryption. FIPS ...

How Agentic AI Can Secure Network Infrastructure?

We’ve officially entered the era of agentic AI—where systems do more than just follow instructions. These AI agents can now act autonomously, make decisions, execute tasks, and learn continuously from their interactions within digital ...

Hackers Access Legacy Systems in Oxford City Council Cyberattack

Personal data of former and current council workers, including election staff, may have been accessed by hackers. The post Hackers Access Legacy Systems in Oxford City Council Cyberattack appeared first on SecurityWeek.

Strategies to secure long-life IoT devices

In this Help Net Security interview, Rob ter Linden, CISO at Signify, discusses priorities for CISOs working on IoT security, including the need for compliant infrastructure, easy device management, and preparing for future tech like quantum ...

Is Cold Email Still Effective in 2025? Best Practices for Outreach and Security

Cold email still works in 2025—but only if done right. Learn best practices, deliverability tips, and how to secure your domain for real results. The post Is Cold Email Still Effective in 2025? Best Practices for Outreach and Security appeared ...

CISOs flag gaps in GenAI strategy, skills, and infrastructure

95% of C-suite leaders say that GenAI is driving a new level of innovation in their organizations, according to NTT DATA. While CEOs and business leaders are committed to GenAI adoption, CISOs and operational leaders lack the necessary guidance, ...

Who’s guarding the AI? Even security teams are bypassing oversight

Even security teams, the ones responsible for protecting the business, are adding to AI-related risk. A new survey by AI security company Mindgard, based on responses from over 500 cybersecurity professionals at RSAC 2025 Conference and ...

AI Index 2025: What’s changing and why it matters

Stanford recently released its AI Index 2025, and it’s packed with insights on how AI is changing. For CISOs, it’s a solid check-in on where things stand. It covers what the tech can do now, how governments are responding, and where public ...

New infosec products of the week: June 20, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BigID, Dashlane, Sumsub, and Jumio. Dashlane’s AI model alerts businesses to phishing risks In contrast to rule-based filters or reliance on a threat ...

A New Identity Playbook for AI Agents: Securing the Agentic User Flow

Artificial intelligence has reached an inflection point. AI agents are no longer just service accounts or background processes. They’re decision-makers, workflow executors, and digital delegates—acting autonomously across APIs, clouds, and ...

The Identity Gaps in Agentic AI: 9 Problems We Must Solve to Secure the Future

AI agents have evolved from passive tools into proactive actors—making decisions, executing transactions, and interacting with APIs autonomously. Unlike traditional non-human identities (NHI) that serve narrow, static purposes, agentic ...

Understanding EchoLeak: What This Vulnerability Teaches Us About Application Security | Impart Security

Understanding EchoLeak: What This Vulnerability Teaches Us About AI Security The recent disclosure of EchoLeak by Aim Labs marks a significant milestone in AI security research. As the first documented zero-click exploit targeting a production AI ...

Why AI Agents Deserve 1st Class Identity Management

Artificial intelligence is no longer just about passive assistants or chatbots that wait for human instructions. We’re in the agentic era—where AI agents reason, plan, take initiative, and act autonomously. These agents don’t just help ...

Agents Are People Too: The Identity Gaps That Put AI Agents—and Enterprises—at Risk

AI agents have crossed a threshold. They’re no longer just tools waiting for instructions. They reason, plan, act, and collaborate autonomously—often across systems and domains, without direct human oversight. Gartner predicts that by 2026, ...

Be Optimistic About the Future of Secrets Management

Can Optimism Shape the Future of Secrets Management? Secrets management has become vital to ensure the safety and integrity of precious information. We are addressing the future of secrets management through a lens of optimism. But why optimism? ...

LinuxFest Northwest: How To Linuxfest

Author/Presenter: Angela Fischer (Jupiter Broadcasting Co-Owner) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their ...

Juneteenth National Independence Day 2025

Juneteenth National Independence Day 2025 Permalink The post Juneteenth National Independence Day 2025 appeared first on Security Boulevard.

Smarter Data Center Capacity Planning for AI Innovation

The rise of advanced technologies like AI, IoT, and edge computing is reshaping data center operations, demanding greater efficiency, scalability, and sustainability. Data center managers must prioritize proactive strategies that ensure uptime, ...

How Financial Institutions Can Meet DORA Compliance with Crypto-Agility

Today’s financial systems are highly digital and deeply interconnected. That’s great until something breaks. Whether it’s ransomware paralyzing critical services or cryptographic vulnerabilities quietly eroding trust, disruptions are no ...