Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI certificate

You can ask AI to create a song that sounds like a famous band sang it. But what happens if you use it or share it? Are there legal or other implications? AI tools must be visible and governed. Shadow AI isn’t. Take Cato’s AI in Cybersecurity course to understand the risks of unsanctioned AI tools. It’s free, comes with a downloadable cert, and earns CPE credits. Register now.

Ep. 48 - Iran's 12 Days of Cyber War: How Missiles Triggered a Global OT Hacking Campaign

June 2025 marked a turning point in cyber warfare. In this episode of The Cyber Resilience Brief, Tova Dvorin and offensive engineer Adrian Cully break down the cyber escalation that followed Operation Rising Lion—what some analysts now describe as Iran’s 12 days of cyber war. As missiles struck Iranian strategic targets, coordinated hacktivist groups like Cyber Avengers and Handala launched psychological operations, mass SMS spoofing campaigns, and attacks targeting operational technology (OT) systems—including Unitronics PLCs used in water and industrial facilities worldwide.

How LAPSUS$ Bypassed MFA and How to Prevent Similar Identity Attacks

LAPSUS$-linked breaches did not break multi-factor authentication (MFA) cryptographically. Attackers obtained valid authentication outcomes through techniques commonly described as MFA fatigue attacks or MFA bypass attacks, including push-prompt abuse, SIM swapping, social engineering, and session token replay. Understanding how these attacks succeed helps explain where modern identity defenses must evolve.

The Vendor Tiering Series: Mapping Tiers to Inherent Risk

Cybersecurity doesn’t really have quiet days. Usually, it’s just long stretches of constant noise before realizing you’ve been blindsided. That blindside is a flat list of unprioritized vendors. Without a way to filter what matters when a team needs to mitigate the fallout of a crisis, a vendor inventory like this becomes a compliance-only activity that offers a false sense of security.

NIS2 Documentation Requirements: Policies You Must Have

NIS2 documentation requirements form the essential foundation of regulatory compliance — defining the documented controls that underpin NIS2 audit readiness and demonstrable cybersecurity governance. Yet in 2026, the landscape is shifting: documentation alone is no longer enough.

Why AI Features Don't Equal Better Vulnerability Management

AI is becoming table stakes in vulnerability and exposure management. In this candid webinar conversation, Chris Ray, Field CTO at GigaOm, and Will Gorman, CTO and leader of AI initiatives at Nucleus Security, challenge the assumption that more AI automatically leads to better outcomes.

How to Configure Jira OAuth/OIDC SSO Integration with Okta | Step-by-Step Guide

Manually managing user authentication in Jira can lead to security gaps and administrative overhead. By integrating Okta with Jira using the miniOrange OAuth/OIDC SSO plugin, you can provide your team with a seamless, secure, and centralized login experience. In this video, we walk you through the entire end-to-end configuration: from setting up a Web Application in the Okta Admin Console to finalizing the OAuth settings within Jira. You’ll see exactly how to map Client IDs, secrets, and endpoints to get your SSO up and running in minutes.