Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Purpose-Built for MSPs: Unlock New Market Opportunities with Arctic Wolf

In today’s evolving threat landscape, a stack of security tools isn’t enough. MSPs need a partner that helps them scale, differentiate, and deliver exceptional security outcomes. That’s why Arctic Wolf launched a purpose-built MSP program earlier this year, designed in close collaboration with our MSP partners to empower them to grow faster and more profitably.

The Compliance Gap: How Untracked User Lifecycle Changes Create SOC 2 Audit Failures

Forty-seven ghost accounts cost one SaaS company a $2M deal. Their SOC 2 auditor flagged a critical issue: former employees still had active system access, even those terminated six months earlier. The security team invested heavily in firewalls, encryption, and penetration tests. They failed on something more urgent: proving immediate access removal when people left.
Featured Post

Too Many Tools, Too Little Control: The Security Sprawl Problem

As Forrester expects the cost of cybercrime to reach $12 trillion by the end of 2025, enterprises are gearing up and investing heavily in cybersecurity. Yet, despite rising budgets, security leaders' confidence in detecting and recovering from incidents is declining. A key culprit is security tool sprawl, which quietly erodes visibility, speed, and trust in operations.

2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks

The new 2025 Insider Risk Report, produced byCybersecurity Insiders in collaboration with Cogility, highlights that nearly all security leaders (93%) say insider threats are as difficult or harder to detect than external cyberattacks. Yet only 23% express strong confidence in stopping them before serious damage occurs. The report warns that most organizations remain reactive despite a surge in AI-driven risks and the increasing prevalence of decentralized workforces.

Emerging Threat: CVE-2025-64095 - Critical Unauthenticated File Upload Vulnerability in DNN (DotNetNuke)

CVE-2025-64095 is a critical unauthenticated file-upload vulnerability affecting DNN (DotNetNuke) versions prior to 10.1.1. The flaw exists in the platform’s default HTML editor provider, where upload validation and authorization checks were insufficient. Attackers can upload files and overwrite existing content without credentials, enabling page defacement, malicious script injection, and in some environments stored cross-site scripting (XSS).

Money20/20 2025 recap: Crypto is in its infrastructure era

Money20/20 has always been a window into what's next for money movement, and in 2025, crypto and stablecoins took center stage with a new energy and focus. This year, the discussions for crypto were all about infrastructure, collaboration, and building systems that last. Across sessions, one message kept surfacing: Crypto's future depends on collaboration. During our Money20/20 panel, Lee Bagan from Bridge put it best: "We're not asking if crypto can work within the system anymore.

MWC Las Vegas 2025 recap: Verified identity is pivotal for trust in communications

As Persona’s telecom lead, I've spent much of my career speaking to communications platform as a service (CPaaS) and network providers about verification and consumer protection in the wireless industry. Sometimes, it felt rare to see the telecom and identity worlds truly intersect at industry events, but at this year’s Mobile World Congress Las Vegas, that intersection was impossible to miss.

Data Security Posture Management, Early Access

Today's data sprawls across the cloud, on-prem, and endpoints. Data lives everywhere, but the biggest challenge isn't just knowing where data resides across the organization. Security teams must understand what the data represents, identify what’s at risk, and protect it in real time.