Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Strong Passwords are Still the Best Defence Against Cyber Threats

After covering the importance of unique usernames in yesterday's blog, we would be remiss not to take a look at the second half of most login credentials: passwords. These are important because, despite increasingly sophisticated cybersecurity technologies and methodologies, 86% of breaches still involve stolen credentials.

Random but Memorable - Episode 14.6: Security Agents Protecting Adolescence with Chris McCarty

This episode we meet Chris McCarty, the inspirational student and founder of Quit Clicking Kids, an organization advocating for children's rights in the digital age. Learn about the rise of “sharenting” and how Chris is fighting for legislative changes to safeguard minors from exploitation on social media platforms. We cover everything from the permanence of online content to getting Gen Z proactive about their privacy.

Access Requests, Approvals & Provisioning - All in Jira | Workflow for Jira by miniOrange

Streamline Access Requests & Provisioning with Workflow for Jira by miniOrange | Product Demo Tired of messy spreadsheets, email approvals, and manual provisioning? Say hello to Workflow for Jira by miniOrange — your all-in-one solution to automate Application Access & Governance directly within Jira Service Management.

Top 5 Tech Trends Shaping Financial Services in 2025

New technologies, regulatory shifts, and the next generation of clients are redefining the financial services industry and what customers expect from the firms they work with. Firms embracing these changes will gain a competitive edge, while those who ignore them risk falling behind. Countless technology innovations across the industry are redefining the customer experience, security, data management, and back-office functions. But what is poised to make the biggest impact in 2025?

Data Weaponization: How Cyber Attacks Impact the Vulnerable

Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Pavlina Pavlova, a researcher and cybersecurity advocate focusing on data weaponization and its disproportionate impact on vulnerable populations. Pavlina defines data weaponization as using data to manipulate, deceive, coerce, or attack someone to inflict harm. Her research investigates why cyber attacks and their impacts often have gendered dimensions, with certain populations experiencing more severe consequences.

Defend from Adversaries in the Tradecraft Attacking the Cloud w/ CrowdStrike Falcon Cloud Security

CrowdStrike Falcon Cloud Security: ► Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud security for complete visibility and protection.

CrowdStrike Falcon Fusion SOAR Content Library

Security teams often lose valuable time pivoting between tools to contain threats. With CrowdStrike Falcon Fusion SOAR's content library, you can streamline incident response using no-code automation to quickly build workflows and a rich content library of orchestrate with third-party integrations and pre-built actions. In this demo, see how teams can quickly integrate with popular security and IT tools and run playbooks in just a few clicks—directly from the Workbench. No context switching. No manual effort.

Why MFA is Not Enough to Fight ATO and How Memcyco Can Help

Multi-Factor Authentication (MFA) has long been considered a robust security measure, with Microsoft research showing it can block 99.9% of automated attacks. However, recent data indicates that sophisticated attackers have developed numerous techniques to bypass MFA, making it insufficient as a standalone defense against Account Takeover (ATO) attacks.