Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

OpenShift Virtualization Fast Disaster Recovery with Trilio in AWS ROSA Baremetal

In my previous blog post, (OpenShift Virtualization Backup and Restore with Trilio in AWS ROSA Baremetal ) I discussed how to protect VMs running in OpenShift Virtualization, specifically in AWS ROSA Baremetal environments. In this post, I want to focus on how you can recover a VM in less than 3 minutes. When it comes to recovery in Kubernetes environments, many of us feel relatively at ease, especially if the Persistent Volumes (PVs) are not particularly large.

Ivanti Discloses Active Exploitation of Zero-Day Vulnerability

Ivanti has disclosed vulnerabilities affecting Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS) and Ivanti Neurons for Zero Trust Access (ZTA) Gateways. According to Ivanti, CVE-2025-0282 has been exploited on a limited number of ICS appliances. There are no confirmed reports of exploitation for Ivanti Policy Secure or ZTA Gateways. There is no indication that CVE-2025-0283 is actively exploited or chained.

Mastering OpenShift Virtualization Backup - Recover VMs in 3 Minutes

In my previous blog post, (OpenShift Virtualization Backup and Restore with Trilio in AWS ROSA Baremetal ) I discussed how to protect VMs running in OpenShift Virtualization, specifically in AWS ROSA Baremetal environments. In this post, I want to focus on how you can recover a VM in less than 3 minutes. When it comes to recovery in Kubernetes environments, many of us feel relatively at ease, especially if the Persistent Volumes (PVs) are not particularly large.

Securing Your Financial Ecosystem: A Guide to Managed Services for Supply Chain Detection and Response

A single breach can have devastating consequences in the highly regulated financial services industry. From reputational damage and customer loss to severe financial penalties, safeguarding your entire ecosystem is paramount. This blog explores the critical role of Managed Services for Supply Chain Detection and Response (SCDR) in securing your financial services organization.

Aligning to Secure the AI-Driven Enterprise

Next week marks a pivotal moment for Zenity as we gather for our Sales Kickoff (SKO). While SKOs are traditionally about aligning teams on goals and strategies, ours represents much more than that. It’s a celebration of the massive growth in the AI Agent space, the opportunities it creates, and our recommitment to supporting customers as they navigate this transformative and increasingly security-conscious era.

Phishing, Impersonation and Cybersecurity Trends 2025

As scam-prone enterprises know, innovations in digital technologies raise the specter of phishing-related brand impersonation scams as much as they help mitigate it. Take rogue Generative AI tools like Fraud GPT and ‘Phishing-as-a-Service’ as just two examples of how fraudsters are co-opting new technologies as part of customer account takeover (ATO) schemes.

Security Bulletin: PowerSchool K-12 Data Breach

PowerSchool, a widely used cloud-based and on-premises platform, experienced a data breach reported on December 28, 2024. The platform helps K-12 schools manage student and teacher information, including Personally Identifiable Information (PII), attendance records, grades, medical information, and Social Security numbers. The breach affected both cloud and on-premises customers after a compromise of maintenance account credentials allowed the threat actor to exfiltrate sensitive data.

The Top 10 Reasons People Fail a CMMC Audit

The Cybersecurity Maturity Model Certification, version 2.0, is finally in effect, which means thousands of businesses that have roles in the Department of Defense supply line need to do the work to comply and pass their audits to receive certification. It’s inevitable that many of these businesses will fail their initial audits. The standards are high, the margin of error is narrow, and the timeline is tight.

Why Vulnerability Scanning Alone Isn't Enough: The Case for Penetration Testing

Organizations today face a rapidly evolving threat landscape, and as they plan their cybersecurity strategy and budgets, many may struggle with a key question: If I’m conducting regular vulnerability scans, and patching the vulnerabilities I identify, do I really need penetration tests as well? The answer is yes. While vulnerability scanning plays a vital role in identifying risks and vulnerabilities, relying solely on it for security creates blind spots.