Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

IBM's Troy Bettencourt shares key insights from the 2024 Cost of a Data Breach Report

It should be no surprise that the costs associated with a corporate data breach can be high. (The average total cost is now nearly $5 million, according to IBM.) What may be more alarming is the average length of time it takes for businesses to recover from a breach – and what that means for their security teams, business operations, and bottom line.

API Security: The Non-Negotiable for Modern Transportation

The transportation sector is undergoing a digital revolution, from railways to aviation and trucking. APIs are at the heart of this transformation, particularly for airlines. Airlines utilize APIs to integrate internal systems with vital services such as booking platforms, check-in services, real-time flight updates, communication with customs agencies, and baggage handling.

Okta vulnerability explained (bcrypt auth bypass)

Okta Bcrypt Authentication Bypass Explained Last week, on October 30th, Okta released an interesting security advisory detailing a vulnerability that could potentially lead to an authentication bypass. According to Okta, the vulnerability was discovered during an internal review and was promptly addressed. Okta was transparent about the issue, sharing the details publicly.

What To Do if You Opened a Phishing PDF

If you think you’ve accidentally opened a phishing PDF, it’s important to immediately disconnect your device from the internet, back up your files, run a virus scan on your device and change your passwords. Typically, you can spot a phishing attempt if an email contains urgent and threatening language, too-good-to-be-true offers, spelling and grammatical errors or requests for private information.

CMMC 2.0 Explained: What You Must Know For 2025

With the final CMMC rule published, here’s a summary of everything you need to know for your CMMC Level and when. Another step closer. After more than seven years in the making, the US Department of Defense (DoD) finalized a rule establishing the Cybersecurity Maturity Model Certification (CMMC) program and outlining how it will work. The final program rule was published in the Federal Register on 15 October and will go into effect on 16 December.

CyberArk Extends Partnership with Microsoft to Simplify Entra ID Authentication

It’s finally here! Microsoft’s new external authentication methods (EAM) is now available in public preview, set to replace custom controls. For the past couple of months, we’ve been working closely with the Microsoft Entra ID team to bring you this highly anticipated security enhancement. External authentication methods integration with CyberArk delivers enhanced security while simplifying user experiences.

The Role of Secure Shipping in Protecting High-Value Goods

Transporting high-value goods, whether it be jewelry, electronics, artwork, or luxury items, requires an enhanced level of care and attention. The process of shipping these valuable items comes with inherent risks, such as theft, damage, or loss during transit. This is where secure shipping plays a vital role in ensuring that high-value goods are transported safely and arrive at their destination without incident. Implementing robust security measures throughout the shipping process is crucial for minimizing risk and maintaining the integrity of high-value shipments.

Microsoft Word's recent glitch deleted documents when saving them

Have your users spent hours working on a document in Microsoft Word, only to have it disappear when they try to save it? A recent bug in Microsoft Word, highlighted by Bleeping Computer, caused Word documents to be deleted instead of saved, leaving users frustrated. For IT administrators, it is vital to address these issues and educate users within the organization about best practices to reduce data loss and ensure business continuity.

Sales spotlight: Kate's Account Executive journey at Persona

In this spotlight, Kate discusses their transition into their first Account Executive role and offers insights into what sets sales at Persona apart. Colette is part of the Talent team at Persona. She spends most of her weekends hiking, camping, or at the beach! Colette is part of the Talent team at Persona. She spends most of her weekends hiking, camping, or at the beach!