Application Security News and Articles


19 Billion Passwords Leaked: Essential Tips for Your Protection

19 billion passwords leaked! Discover how to protect yourself and your organization with actionable tips. Secure your digital life today! The post 19 Billion Passwords Leaked: Essential Tips for Your Protection appeared first on Security Boulevard.

Conjur: Open-source secrets management and application identity

Conjur is an open-source secrets management project designed for environments built around containers, automation, and dynamic infrastructure. It focuses on controlling access to credentials such as database passwords, API keys, and tokens that ...

Governance maturity defines enterprise AI confidence

AI security has reached a point where enthusiasm alone no longer carries organizations forward. New Cloud Security Alliance research shows that governance has become the main factor separating teams that feel prepared from those that do not. ...

Elementary OS 8.1 rolls out with a stronger focus on system security

Elementary OS 8.1 is now available for download and shipping on select hardware from retailers such as Star Labs, Slimbook, and Laptop with Linux. The update arrives after more than a year of refinements based on community feedback and issue ...

Counterfeit defenses built on paper have blind spots

Counterfeit protection often leans on the idea that physical materials have quirks no attacker can copy. A new study challenges that comfort by showing how systems built on paper surface fingerprints can be disrupted or bypassed. The research ...

What happens to enterprise data when GenAI shows up everywhere

Generative AI is spreading across enterprise workflows, shaping how employees create, share, and move information between systems. Security teams are working to understand where data ends up, who can access it, and how its use reshapes security ...

What are Access Tokens? Complete Guide to Access Token Structure, Usage & Security

Learn everything about access tokens: their structure, how they work in SSO and CIAM, and critical security measures to protect them from threats. The post What are Access Tokens? Complete Guide to Access Token Structure, Usage & Security ...

AI-Driven Anomaly Detection for MCP Security.

Explore how AI-driven anomaly detection enhances the security of Model Context Protocol (MCP) deployments, protecting AI infrastructure from evolving threats with real-time insights. The post AI-Driven Anomaly Detection for MCP Security. appeared ...

Understanding the Difference Between Passkeys and Biometrics

Explore the differences between passkeys and biometrics in authentication. Understand their functionalities, security, and how they enhance software development. The post Understanding the Difference Between Passkeys and Biometrics appeared first ...

Formal Verification of MCP Security Properties against Post-Quantum Adversaries

Explore formal verification's role in securing Model Context Protocol (MCP) deployments against quantum computing attacks. Learn how mathematical proofs and verification tools ensure robust AI infrastructure security. The post Formal Verification ...

SAML Security: Complete Guide to SAML Request Signing & Response Encryption

Learn how SAML request signing and response encryption protect your SSO implementation. A comprehensive guide covering integrity, confidentiality, and best practices. The post SAML Security: Complete Guide to SAML Request Signing & Response ...

What makes an AI system adaptable to new security challenges

Can Non-Human Identities Enhance Security in the Age of AI? The Intersection of AI Systems and Non-Human Identities How do organizations ensure that their AI systems remain adaptable to new security challenges? Non-Human Identities (NHIs) are a ...

What features ensure scalability in secret management

How Can Organizations Achieve Scalability in Secret Management? Securing sensitive data in the cloud isn’t just about protecting against external threats. Have you considered the importance of effectively managing machine identities to maintain ...

Why staying ahead with Agentic AI is crucial for business

How Can Non-Human Identities Enhance Business Security With Agentic AI? Where technology continuously evolves, how can businesses leverage advancements to solidify their security posture? The answer lies in understanding and managing Non-Human ...

How can proactive AI security prevent data breaches

Can Organizations Trust Proactive AI Security to Prevent Data Breaches? The management of Non-Human Identities (NHIs) is becoming essential for organizations operating across various sectors such as financial services, healthcare, and DevOps. ...

The Global Data Residency Crisis: How Enterprises Can Navigate Geolocation, Storage, and Privacy Compliance Without Sacrificing Performance

A Comprehensive Technical Guide for CTOs, CISOs, and Identity Architects The post The Global Data Residency Crisis: How Enterprises Can Navigate Geolocation, Storage, and Privacy Compliance Without Sacrificing Performance appeared first on ...

NDSS 2025 – Detecting SDN Control Policy Manipulation Via Contextual Semantics Of Provenance Graphs

Session 7A: Network Security 2 Authors, Creators & Presenters: Ziwen Liu (Beihang University), Jian Mao (Beihang University; Tianmushan Laboratory; Hangzhou Innovation Institute, Beihang University), Jun Zeng (National University of ...

ServiceNow Announces $7.75 Billion Acquisition of Cybersecurity Firm Armis

ServiceNow Inc. agreed Tuesday to acquire cybersecurity startup Armis for $7.75 billion in its largest acquisition, as companies face increasingly sophisticated artificial intelligence (AI)-driven cyberattacks. The enterprise software giant said ...

6 Ways to move from security questionnaires to self-serve trust

In this session of the Strategic CISOs webinar series, Sravish Sridhar (CEO, TrustCloud) sat down with Myke Lyons (CISO, Cribl) and Jon Zayicek (Customer Security Assurance Leader, Cribl) to break down how Cribl built a customer trust program ...

NDSS 2025 – A Large-Scale Measurement Study Of The PROXY Protocol And Its Security Implications

Session 7A: Network Security 2 Authors, Creators & Presenters: Stijn Pletinckx (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa ...