Application Security News and Articles


How to Reduce PR Merge Time from 14 Days to Under a Day? | Panto AI

Imagine engineers finishing a new feature, only to see it sit idle in a pull request (PR) queue for days or even weeks. This delay is not…Continue reading on Medium »

[Webinar] Securing AI-driven applications with DAST

Join us for a live webinar with application security experts and Escape clients - Seth Kirschner (DoubleVerify), Nathan Byrd (Applied Systems), Nick Semyonov (PandaDoc), as they break down how their teams are rethinking testing strategies to keep ...

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication. The post Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking appeared first on SecurityWeek.

Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption

Trend Micro patches critical-severity Apex Central and Endpoint Encryption PolicyServer flaws leading to remote code execution. The post Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption appeared first on SecurityWeek.

StackHawk Sensitive Data Identification provides visibility into high-risk APIs

StackHawk announced Sensitive Data Identification to give security teams visibility into high-risk APIs across thousands of code repositories within an organization. With most security teams only aware of approximately 10% of their API attack ...

SAML vs. OAuth 2.0: Mastering the Key Differences

Imagine this: It’s Monday morning. You grab your coffee, sit down at your desk, and open up your computer. First, you log into your email. Then, your project management tool… Before you’ve even tackled your first task, you’ve navigated a ...

ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions

ZeroRISC has raised $10 million in seed funding for production-grade open source silicon security, built on OpenTitan designs. The post ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions appeared first on SecurityWeek.

Unpacking the security complexity of no-code development platforms

In this Help Net Security interview, Amichai Shulman, CTO at Nokod Security, discusses how the abstraction layer in no-code environments complicates security by obscuring data flow, identity propagation, and control logic. Shulman also addresses ...

What CISOs need to know about agentic AI

GenAI has been the star of the show lately. Tools like ChatGPT impressed everyone with how well they can summarize, write, and respond. But something new is gaining ground: agentic AI. These systems don’t just answer questions. They make ...

Security flaws in government apps go unpatched for years

78% of public sector organizations are operating with significant security debt, flaws left unaddressed for more than a year, according to Veracode. 55% are burdened with ‘critical’ security debt, representing long-standing vulnerabilities ...

19 ways to build zero trust: NIST offers practical implementation guide

The National Institute of Standards and Technology (NIST) has released a new guide that offers practical help for building zero trust architectures (ZTA). The guidance, titled Implementing a Zero Trust Architecture (SP 1800‑35), includes 19 ...

New infosec products of the week: June 13, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Contrast Security, Cymulate, Lemony, SpecterOps, Thales, and Vanta. Lemony mitigates privacy and compliance risks associated with cloud-based AI With ...

NSFOCUS Earns ISO 27701:2019 Privacy Information Management System Certification

Santa Clara, Calif. Jun 13, 2025 – NSFOCUS, a global provider of intelligent hybrid security solutions, announced today that it has attained ISO 27701:2019 Privacy Information Management System (PIMS) certification. ISO/IEC 27701 extends the ...

7 Steps to Developing a Cybersecurity Strategy

The post 7 Steps to Developing a Cybersecurity Strategy appeared first on AI Security Automation. The post 7 Steps to Developing a Cybersecurity Strategy appeared first on Security Boulevard.

Integrative Security That Doesn’t Add Work to Your Workload

The post Integrative Security That Doesn’t Add Work to Your Workload appeared first on Votiro. The post Integrative Security That Doesn’t Add Work to Your Workload appeared first on Security Boulevard.

Assured Compliance Through Effective NHI Management

Is Assured Compliance Your Ultimate Goal? Consider Effective NHI Management Ever wondered how Non-Human Identities (NHIs) and Secrets Security Management could significantly enhance your cybersecurity strategy and lead to assured compliance? With ...

Freedom to Choose Your NHI Security Approach

Does Non-Human Identity Management Hold the Key to Effective Cybersecurity? The management of Non-Human Identities (NHIs) and secrets has emerged as a pivotal component. For organizations aiming to bolster their cybersecurity strategy, the ...

LinuxFest Northwest: LFNW 2025: In The Beginning…

Author/Presenter: Jon "maddog" Hall (Board Chair Emeritus: Linux Professional Institute, Founder: Project Cauã, Co-Founder: Caninos Loucos, Technical Advisor: QSentinel, Executive Director: Linux® International®) Our sincere appreciation to ...

CIAM in 2025: Navigating the Authentication Revolution and Solving Tomorrow’s Identity Challenges

The customer identity and access management landscape in 2025 presents both unprecedented opportunities and complex challenges. Organizations that succeed will be those that view identity management not as a technical infrastructure component, ...

Why hybrid deployment models are crucial for modern secure AI agent architectures

As enterprises embrace AI agents to automate decisions and actions across business workflows, a new architectural requirement is emerging — one that legacy IAM systems (even SaaS IAM!) were never built to handle. The reality is simple: AI ...