Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Navigating Digital Nightmares: A Survivor's Battle Against Online Harassment

Technology can serve as a double-edged sword for women grappling with domestic abuse: while it has the potential to save lives, it also has the capacity to lay bare one's most intimate vulnerabilities. One such harrowing story comes from a survivor (which we will call Bridget to protect her anonymity), who faced a nightmare of cyberstalking, intimate image abuse (colloquially known as revenge porn), and relentless online harassment that lasted for years.

Rapid Data Heist: Akira Ransomware Group's Two-Hour Attack on Veeam Servers

In a startling development, the Akira ransomware gang has demonstrated a dramatic reduction in the time it takes to exfiltrate data from compromised servers. According to the BlackBerry Threat Research and Intelligence Team, this cybercriminal group managed to steal data from a Veeam server in just over two hours during a June attack on a Latin American airline.

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl

Do you have secrets sprawled across your tech stack? The recent Disney breach is as good a reminder as any to check, because it’s likely that you do. But first, let’s take a closer look at the Disney breach to understand what may have gone wrong, and how you can prevent a similar breach from happening to your business.

Continuous Threat Exposure Management (CTEM): A new era in proactive cyber defense

Do we need a new cybersecurity framework? According to Gartner, the answer is yes. Since 2022, they have championed CTEM, a five-stage approach designed to shrink attack surfaces and minimize cyber threat exposure through continuous risk assessment and mitigation. At its core, CTEM advocates for regularly testing your defenses to find vulnerabilities in your system and fortify your organization’s security with risk mitigation strategies.

CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the ending was far more devasting. More than 100 organizations were exposed, and many are now grappling with the impacts of data theft and extortion in what some are calling one of the largest breaches in history.

PAM Essentials: A breakthrough in secure access solutions

We're excited to announce new capabilities of One Identity’s Cloud PAM Essentials, launched in March 2024, featuring our innovative Secure Gateway secure tunnel solution. This groundbreaking product offers a VPN-less solution designed to provide secure, seamless access to your critical resources. The journey from initiation to market release took just nine months, a testament to our team's dedication and efficiency.

Why the World's Top MSSPs are Ditching Legacy SOAR for Hyperautomation

Managed Security Service Providers (MSSPs), desperate to automate repetitive tasks, initially turned to SOAR to reduce their workload and improve threat response times. Unfortunately, legacy SOAR tools still face scalability, flexibility, and integration challenges. As the complexity and volume of cyber threats continue to grow, the limitations of legacy SOAR have become more apparent, necessitating the move towards more advanced automation technologies like Torq Hyperautomation.