Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Human Risk Multiplier: How Mobile Devices Expand Enterprise Attack Surfaces

Modern businesses are more reliant on mobile devices than ever before. Employees need smartphones and tablets for communication, productivity, and even security authentication. As remote and hybrid work setups become more common, mobile technology is necessary for keeping workers connected to their organizations. At the same time, these devices expose a weak link in the cybersecurity chain: the human layer.

The Missing Memory in Your Security Stack: How Attackers Exploit Stateless Systems

Security teams are facing a daunting challenge: today’s cyberattacks are slower, quieter, and more difficult to spot than ever before. Adversaries, from nation-state actors to malicious insiders, have mastered the art of flying under the radar. They stretch their activities over days, weeks, or even months, using legitimate credentials and tools to disguise their actions as normal business operations. The uncomfortable truth is that most SIEM and XDR platforms are stateless.

Emerging Threat: Django SQL Injection Vulnerability (CVE-2025-64459)

CVE-2025-64459 is a critical SQL injection vulnerability in the Django web framework’s ORM. It affects Django 5.1 versions earlier than 5.1.14, Django 4.2 versions earlier than 4.2.26, and Django 5.2 versions earlier than 5.2.8. Earlier, unsupported series such as 5.0.x, 4.1.x, and 3.2.x were not evaluated and may also be affected, which makes legacy deployments especially risky.

Ultimate guide to picking the right type of penetration testing

Securing your organization’s assets is more crucial than ever before! Penetration testing, also known as pen testing, has emerged as one of the best practices for identifying vulnerabilities before attackers do. This ultimate guide will help you understand how pen testing fits into an overall security strategy, outline key tools and methodologies, and detail how to ensure compliance with various regulatory frameworks.

How a pentest strengthens audit evidence and adds value

Penetration testing and auditing are both methods of gaining assurance, but they operate from different angles. A pentest evaluates how well security controls stand up to real-world attack scenarios, while an audit examines whether those controls are designed, implemented, and maintained according to policy or recognised standards.

How Reach Security Automates Remediation and Prevents Configuration Drift

From identification to remediation to drift management. When Reach flags an exposure, it doesn’t stop there. It shows exactly how much risk you’ll reduce by fixing it — and what impact it’ll have on users. In this short demo, CRO Jared Phipps walks through how Reach:︎ Quantifies residual risk reduction (e.g., 62%, 91%, etc.)︎ Weighs that against user impact︎ Guides teams through the remediation process︎ Integrates with Jira or other ticketing systems to track fixes︎ Monitors configurations to prevent drift and maintain baselines.

The Convergence of Threats: Insights from the 2025 ENISA & Microsoft Reports

Muhammed Mayet, Global Sales Engineering Director, at Obrela elaborates on ENISA’s Threat Landscape 2025 and Microsoft’s Digital Defense Report 2025 and discusses how resilience can win over complexity The European Union Agency for Cybersecurity (ENISA), in its Threat Landscape 2025 report, paints a vivid picture of sustained and diverse cyberattacks across the EU.

A simpler, faster way to unlock 1Password

We’ve all been there. You open your laptop, log in to your account, log in to your password manager, step away for a quick coffee break, and come back ready to get started on a project, only to be asked by your computer and password manager to log in to both all over again. It’s safe, sure, but it can also feel like one extra speed bump between you and getting work done.

Certificate Manager - Tanium Tech Talks #146

Today see how Tanium gives you cross-platform visibility and control of digital certificates! Inventory certificate listening services and files at rest Get data fast without network scans Quickly replace certificates at scale Scripted actions recycle services to activate new certificates Identify risky, expired, self-signed, post-quantum cryptography, weak ciphers, wild-cards, and more.

Navigating GDPR compliance: A guide for data-driven organizations

The General Data Protection Regulation (GDPR) isn’t new, yet many organizations still struggle to meet its requirements. Why? It’s in part, at least, because GDPR is just plain hard to follow. As it turns out, meticulously protecting the personal data of 450 million citizens of the European Union (EU) isn’t easy. Most IT professionals, managed service providers (MSPs) and business leaders know what GDPR is. Many know what it requires.