Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Drupal Single Sign On - Microsoft Entra ID as OAuth Provider

This video will walk you through the steps required to configure Microsoft Entra ID as OAuth Provider and Drupal as OAuth Client. The module allows users to log in to the Drupal site using their Microsoft Entra ID credentials. Chapters: Don't forget to subscribe to our channel and click on a bell icon to get notifications about new uploads.

How Do APIs Get Hacked? A Developer & DevOps Perspective

APIs are now the most attacked layer in the application stack— APIs are being hit 68% more often per host than traditional web apps with APIs facing 1600% more DDoS traffic than web apps. This was found in the state of application security 2024 report where we analyzed 2 billion API attacks blocked on AppTrana WAAP. This isn’t surprising. APIs are inherently automation-friendly, often underprotected, and expose direct access to data and logic.

Top Online Shopping Tips for Retailers and Consumers

While retail cybersecurity concerns only gain attention as the holiday shopping season approaches, the reality is retail is a 24/7/365 operation and so are its associated security issues. Recently, we sat down with Craig Searle, Director, Consulting & Professional Services in Pacific at Trustwave, to discuss the security moves retailers need to have in place. Question: Let's start off in your neighborhood and explore the Australian retail space for a moment. Is there anything unique to this region?

Move Aside, Cloud. Egnyte Intelligence Is Here | Egnyte

Tired of hunting through endless reports and data silos to find what matters? It's time to move aside, cloud—and make way for intelligence. Egnyte Intelligence transforms how teams discover and act on their content by combining powerful AI with secure, compliant collaboration. Discover how your business can unlock smarter workflows, faster decision-making, and real-time content insights—all from a single platform.

Why Do You Need an Automated VAPT Tool? (5 Alarming Signs)

Imagine waking up to news that your company’s data has been leaked, your customers' trust is shattered, and your brand’s reputation is in tatters. Cybercriminals don’t wait for you to react—they exploit vulnerabilities the moment they find them. You're already playing a dangerous game if your security measures are outdated or reactive.

Types of Multi-Factor Authentication (MFA)

The four types of Multi-Factor Authentication (MFA) are knowledge, possession, inherence and location. These authentication types give users numerous options for securing their data, ranging from hardware security tokens to biometric scans. Learn more about each type of MFA method to help you choose which one will best protect data for you or your business.