Application Security
F5 Strengthens, Scales & Sustains AI Security With Integrated Runtime Protection
Adrian Bridgwater | | ADC (application delivery controller), Application Security, Cloud Security, data protection, Data Security, f5
F5 AI Guardrails and F5 AI Red Team extend platform capabilities with continuous testing, adaptive governance and real-time protection ...
Security Boulevard
[Webinar] Doing More With Less: How Security Teams Escape Manual Work with Efficient Workflows
Security teams are under constant pressure to do more with the same resources. Manual processes, fragmented tools, and inefficient workflows can slow teams down and pull focus away from what matters most.In ...
DAST vs Penetration Testing: Key Differences in 2026
Learn about the key differences between DAST and pentesting, the emerging role of AI pentesting, their roles in security testing, and which is right for your business ...
AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities
Really interesting blog post from Anthropic: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only ...
OWASP Top 10: Application Security Meets AI Risk
Aaron Linskens | | AI, Application Security, open source, open source risk, owasp, OWASP Top 10, risk
The OWASP Top 10 has long served as a reality check for development teams: a concise, community-driven snapshot of the most critical web application security risks organizations face today ...
ZEST Security Adds AI Agents to Identify Vulnerabilities That Pose No Actual Risk
Michael Vizard | | AI Sweeper Agents, AI vulnerability management, application security AI, auto-remediation security, DevSecOps Automation, exploitable vulnerability detection, reducing patch backlog, vulnerability prioritization
ZEST Security introduces AI Sweeper Agents that identify which vulnerabilities are truly exploitable, helping security teams cut patch backlogs and focus on real risk ...
Security Boulevard
Why Smart Contract Security Can’t Wait for “Better” AI Models
Sahaj Gandhi | | access control vulnerabilities, AI security tools, Application Security, Smart Contract Security, web3 security
The numbers tell a stark story: $1.42 billion lost across documented incidents in due to smart contract vulnerabilities, with access control flaws accounting for $953.2 million in damages alone. While the Web3 ...
Security Boulevard
How to Visualize Web & API Coverage with Screenshots and Validate Attack Paths in Escape
Visualize web and API coverage, validate attack paths, and confirm every executed action with screenshots and logs in Escape ...
Open Source Malware Index Q4 2025: Automation Overwhelms Ecosystems
Sonatype Security Research Team | | Everything Open Source, Malware, Malware Analysis, open source, open source management, open-source malware
As open source software continues to fortify modern applications, attackers are finding new and increasingly efficient ways to exploit the trust developers place in public ecosystems ...
Arcjet Python SDK Sinks Teeth Into Application-Layer Security
Adrian Bridgwater | | API security, Application Security, Cloud Security, data protection, IT Security and Data Protection, Phishing, python
A new Arcjet SDK lets Python teams embed bot protection, rate limiting, and abuse prevention directly into application code ...
Security Boulevard




