Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The future of security is identity and with CyberArk, the future of identity is secure

The future of security is identity, and with CyberArk, the future of identity is secure. Learn how CyberArk helps secure your organization against identity-based cyberattacks, with intelligent privilege controls for all identities – human and machine.

The MN Department of Education Gets Hit by MOVEit Breach, Exposing Nearly 95K Students

The Minnesota Department of Education oversees public schools throughout the state and manages data for special programs for the students at these organizations. The organization works with thousands of schools throughout the state and manages some data from students at many of these locations. For those reasons, the MDE is a prime target for data thieves looking to exploit students and their parents, and that's exactly what just happened.

How To Check If an Email Attachment Is Safe

Cybercriminals often use phishing emails to get you to click on malicious links or attachments. Clicking on these scams can trigger a malware infection that places all your sensitive data at risk of becoming compromised. Before deciding to click on an attachment, you should make sure it’s safe to open.

Today's Networks are Complex and Complicated, but do they have to be?

Networks today are different from what they were ten years ago, and one could argue that depending on the organization you work for, these networks are different from those just a few years ago. The rise of hybrid networks has made troubleshooting these networks that much more complex. Before, it could have been a hub and spoke design from your end users to the resources they need to access in one of the data centers.

Continuous governance provides a comprehensive strategy across your entire organization

In our previous blog, we touched on how your current identity governance access review processes and workflows may be a major factor in spreading identity fatigue across your organization. In this blog, let’s talk about how you can extend your identity governance far beyond identities and entitlements to protect/secure privileged access, applications, cloud infrastructure and all your critical data.

Are You Prepared for Hurricane Season?

It’s June, and you know what that means. Beach days and barbecues? No, unfortunately, we’re not here to celebrate the start of summer. There’s another — much less pleasant — season afoot. Hurricane season. For the next sixth months, businesses operating along the Southern and Eastern Atlantic coast will hold a collective breath. And for good reason.

A Guide to Handling the MOVEit Attack

Last week, a vulnerability in the popular MOVEit managed file transfer service was exploited by the CL0P ransomware gang to execute data breaches – an increasingly common cybersecurity attack technique where popular software is exploited to target, by extension, their users. Victims of this hack include British Airways, Boots, BBC, and multiple US government agencies.

The CyberShield Event | Safeguarding The Digital Landscape

Obrela's inaugural event in KSA about Cybersecurity. A line up of international speakers and honoured guest were present to discuss intriguing topics. Our CEO, George Patsis, commenced the presentations by addressing the prevailing challenges in CyberDefense and highlighting the emergence of the new Cyber Risk Landscape. Furthermore, we delved into an in-depth discussion regarding the significance of adhering to Cyber Assurance standards, the advancements in Modern Threat Intelligence Centers, the utilization of AI to strengthen CyberDefense capabilities, and the intricate relationship between Cyber Criminals and Nations.