Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 7- Resilience in Identity Management: Avoiding Single Points of Failure

In this episode of Security Matters, host David Puner sits down with Eric Olden, co-founder and CEO of Strata Identity, and a pioneer in modern identity management. Eric shares his career journey, from founding Simplified to leading Oracle’s global identity division, and discusses the critical importance of resilience in identity systems.

Beyond Attachments: How Email Becomes Your Biggest Data Exfiltration Vector

Your Microsoft 365 and Google Workspace security dashboards show green across all metrics. You've implemented data loss prevention policies, enabled advanced threat protection, and your team regularly audits security logs. Yet sensitive data continues to leave your organization through email channels. Why? Because attackers and even non-malicious insiders aren't using the obvious exfiltration techniques your tools were built to detect.

Stop Chasing Payments: Why Freelancers Need Automated Invoicing

Freelancing offers freedom, flexibility, and full control over your time - but when it comes to getting paid, that independence can come at a cost. If you've ever found yourself chasing down late payments or wondering which invoices are still outstanding, you're not alone. For growing creative businesses and solo professionals alike, payment delays aren't just inconvenient - they affect cash flow, strain client relationships, and take time away from doing real, billable work.

How Cyber Security Maturity Assessments Help Strengthen Business Defenses

In today's digitally-driven world, where data is currency and cyber threats evolve faster than ever, businesses of all sizes face increasing pressure to fortify their cybersecurity strategies. From ransomware to phishing attacks, the threat landscape is both complex and unforgiving. Organizations can no longer afford to be reactive about their security posture. Instead, they must take a proactive and strategic approach-and that's exactly where a cyber security maturity assessment becomes essential.

INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense

INE Security, a global leader in hands-on cybersecurity training and certifications, today highlighted how ongoing real-world practice with the latest CVEs (Common Vulnerabilities and Exposures) is essential for transforming security teams from reactive to proactive defenders. With over 26,000 new CVEs documented in the past year, security teams are drowning in vulnerability alerts while facing exploit windows that have compressed to hours in many cases.

Ransomware Response Plan: What Steps Schools and Libraries Should Take After an Attack

In Part 1 of this blog series The Ransomware Threat: Preparing Schools and Libraries for Ransomware Attacks, we discussed creating a pre-incident plan that includes a backup process, asset management, identity and access management, risk-based vulnerability management, and security awareness training to minimize the risk of ransomware attacks.

Get Ready for the 2025 Trustwave Risk Radar Report - Hospitality Sector

Trustwave SpiderLabs’ upcoming report, the 2025 Trustwave Risk Radar Report: Hospitality Sector, will be released on May 21 and will delve into the latest threat landscape, highlighting critical vulnerabilities and offering actionable insights to help hospitality businesses stay secure. The report notes that the hospitality industry has become a prime target for cybercriminals, with threats growing in volume and sophistication.