Application Security News and Articles


SCIM vs SAML: Understanding the Difference Between Provisioning and Authentication

Zero-trust security models are also changing how we think about identity management. The traditional approach of "authenticate once, access everything" is giving way to "authenticate constantly, verify everything." This doesn't change the basic ...

GPS tracker detection made easy with off-the-shelf hardware

Cyberstalkers are increasingly turning to cheap GPS trackers to secretly monitor people in real time. These devices, which often cost less than $30 and run on 4G LTE networks, are small, easy to hide under a bumper or in a glovebox, and can go ...

Sonatype expands global innovation with new India engineering center

At Sonatype, innovation knows no borders. We're excited to announce the opening of our new engineering hub in Hyderabad, India — a strategic milestone in our commitment to scale global innovation  and deliver continuous value to our customers ...

Thieves don’t need your car keys, just a wireless signal

A recent study by researchers at the University of Padova reveals that despite the rise in car thefts involving Remote Keyless Entry (RKE) systems, the auto industry has made little progress in strengthening security. Since RKE’s introduction ...

Secure your data throughout its lifecycle with End-to-End Data Protection

Secure your data throughout its lifecycle with End-to-End Data Protection madhav Thu, 06/19/2025 - 04:53 To most of us, perhaps unknowingly, data is everything. Whether it is a groundbreaking idea, sensitive health records, or confidential ...

91% noise: A look at what’s wrong with traditional SAST tools

Traditional static application security testing (SAST) tools are falling short. That’s the key takeaway from a recent report that tested these tools against nearly 3,000 open-source code repositories. The results: more than 91% of flagged ...

How C-suite roles are shaping the future of tech leadership

As companies accelerate towards technology-driven business models, the tech C-suite is embracing new skills, greater influence, and a unified approach to business transformation, according to Deloitte. Top priorities for tech leaders (Source: ...

News alert: Halo Security’s attack surface management platform wins MSP Today’s top award

Miami, June 18, 2025, CyberNewswire — Halo Security today announced that its attack surface management solution has been named a 2025 MSP Today Product of the Year Award winner by TMC, a leading global media company recognized for building ...

Endpoint adoption of Encrypted DNS

Why endpoint secure DNS adoption matters In a world where we have security options (this is 2025, after all), and yet we don’t bother accessing them, it’s like having vegetables and protein at the buffet but all we eat is the desert. No ...

The Growing Compliance Burden for GRC Teams

The post The Growing Compliance Burden for GRC Teams appeared first on AI Security Automation. The post The Growing Compliance Burden for GRC Teams appeared first on Security Boulevard.

Understanding IAM vs CIAM: A Comprehensive Guide to Identity Management Systems

The distinction between IAM and CIAM reflects the fundamental differences between managing internal organizational resources and serving external customers in the digital age. While both share common identity management principles, their ...

Defending Your Cyber Castle, Part 1: Building the Walls, Moat & Drawbridge of K-12 Security

In a recent webinar, two expert K-12 technology leaders—Glen Drager, Network System Administrator at Tyrone Area School District, and Chris Rowbotham, Director of Technology at Siuslaw School District—joined ManagedMethods’ CRO David Waugh ...

Unlock Powerful Capabilities in Secrets Rotation

Uncover the Hidden Power of Secrets Rotation Have you ever pondered the security capabilities encrypted deep within your cloud environment? Among the most formidable tools is secrets rotation, a strategy that revolves around replacing ...

Lessons from the 23andMe Breach and NIST SP 800-63B

Preventing Credential Stuffing Introduction In 2023, personal genomics company 23andMe suffered a major data breach that exposed sensitive genetic and personal information of nearly 7 million people. The breach was ultimately traced to a ...

Cyber Risk Management Strategy: How to Plan

Online threats are everywhere, and no organization is safe from them. Whether it’s stolen data, ransomware, or phishing, attacks are becoming more frequent and severe. That’s why having a clear... The post Cyber Risk Management Strategy: How ...

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks

The Iranian government has sharply restricted internet access in the country following almost a week of Israeli airstrikes and a cyberattacks on an Iranian bank and cryptocurrency exchange by a pro-Israeli hacker group called Predatory ...

LinuxFest Northwest: Your First Game In Godot

Author/Presenter: Oscar Baechler, MA (Author @ Packt Publishing, Professor, Lake Washington Institute of Technology) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), ...

Russian Hackers Bypass Gmail MFA with App Specific Password Ruse

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords. The post Russian Hackers Bypass Gmail MFA with App Specific Password Ruse appeared first on SecurityWeek.

OAuth and Agentic Identity: The Foundation for Zero Trust AI—and What’s Next

AI agents are no longer theory—they’re live, autonomous actors making decisions, calling APIs, and driving transactions across multi-cloud environments. As enterprises shift from predictive to proactive AI, identity must keep up with AI’s ...

The Identity Problem at AI Scale: Why Agentic AI Demands More From OAuth

AI agents aren’t theoretical anymore. They’re active in our enterprises—making decisions, chaining API calls, interacting across clouds, and operating autonomously at machine speed. But as organizations move from predictive AI to proactive, ...