Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Entra ID OAuth Single Sign-On (SSO) | Log into Joomla using Entra ID as OAuth Client

Learn how to set up Entra ID OAuth Single Sign-On (SSO) with your Joomla website using our Joomla OAuth Client extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Entra ID, allowing users to log into Joomla with their Entra ID credentials using the OAuth protocol. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

OneLogin SAML Single Sign-On (SSO) | Log into Joomla using OneLogin

Learn how to set up OneLogin SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and OneLogin, allowing users to log into Joomla using their OneLogin credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Okta SAML Single Sign-On (SSO) | Log into Joomla using Okta

Learn how to set up Okta SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Okta, allowing users to log into Joomla using their Okta credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Entra ID SAML Single Sign-On (SSO) | Log into Joomla using Entra ID

Learn how to set up Entra ID SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Entra ID, allowing users to log into Joomla using their Entra ID credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Don't Let Data DRAIN Your Budget! #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Signal and TeleMessage - The 443 Podcast - Episode 330

This week on the podcast, we cover Coinbase's recent filing with the SEC that described an insider threat event that led to a ransomware extortion. After that, we dive into Signal and other secure messaging apps, how they protect communications, and how other apps can undermine those protections. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Charlotte AI - Agentic Workflows - Hunting Fake CAPTCHAs

Adversaries are faking CAPTCHAs to trick users into running malicious commands—and using AI to make it convincing. See how CrowdStrike’s Charlotte AI and Agentic Workflows detect these threats, automate response with context-aware actions, and adapt based on risk. CrowdStrike Charlotte AI: ► Work smarter, not harder. Turn hours of work into minutes, or even seconds, with a conversational AI assistant.

How To Reduce Your Attack Surface with Secure Password Management

With the rise of remote work, cloud computing and mobile devices, your organization’s attack surface is larger than ever. Watch this short video to learn what an attack surface is, how to identify security vulnerabilities and five ways to minimize your attack surface.