Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Jira User Management Automation: Auto-Deactivate, Suspend & Delete Inactive Users | miniOrange

Is your Jira user directory cluttered with inactive accounts? Paying for licenses that no one is using? In this video, we walk you through the complete user lifecycle management workflow using the miniOrange Automated User Management app for Jira Cloud, from detecting inactivity to auto-removing access, suspending long-term idle users, and deleting accounts that never returns.

Diving Into Quasar RAT: TTPs, IoCs and more

Quasar, crafted in the C# programming language, is a publicly accessible and open-source Remote Access Trojan (RAT) designed for Microsoft Windows operating systems (OSs). This creation comes courtesy of the GitHub user MaxXor and resides as a publicly hosted repository on GitHub. While its utility extends to legitimate applications like enabling remote assistance from an organization’s helpdesk technician, Quasar is being exploited by APT actors for cybercrime and cyber espionage endeavors.

What Composable Apps Mean for the Web3 Ecosystem

Composable applications are becoming a defining feature of how Web3 ecosystems develop and scale. These apps are built to work together rather than operate in isolation, allowing developers to reuse existing components and users to benefit from interconnected functionality.

How Modern Access Control Is Changing the Way We Secure Buildings

The way we manage who gets into a building has changed significantly over the past decade. Traditional lock-and-key systems are giving way to smarter, more flexible solutions that offer greater control and visibility. Understanding how these systems work can help organisations make better decisions about their security infrastructure.

Private Jet vs Commercial Flights: Time, Cost, and Comfort Compared

In contemporary aviation discourse, the comparison between private jet travel and commercial flights is frequently reduced to a simplistic evaluation of ticket price. Such a limited perspective neglects the broader economic and experiential dimensions of modern air travel, where time efficiency, operational flexibility, and passenger comfort are decisive factors.

What Cybersecurity Risks Does CNC Automation Introduce in 2026?

Manufacturing floors are no longer air-gapped environments. As CNC machines connect to networks for automated loading, real-time monitoring, and remote diagnostics, they become potential entry points for cyber attackers targeting industrial operations. Companies like Gimbel Automation are advancing in-machine CNC automation that reduces manual labor and increases throughput. But every connected system, from spindle grippers to pneumatic workholding, needs cybersecurity planning alongside its mechanical engineering.

How ADAudit Plus eliminates auditing blind spots and provides granular visibility into your AD environment

Active Directory (AD) auditing focuses on topics such as who did what, when, and from where within your network. AD auditing and SIEM monitoring are closely related, yet they play two distinct roles in cybersecurity. SIEM monitoring shows you how a change is connected to an attack or incident. Together, they enable faster investigations, accurate root-cause analysis, and a stronger security posture.
Featured Post

Iranian Cyber Threats, Geopolitics and the New Cyber Reality

In recent weeks, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and the National Cyber Security Centre (NCSC) have all issued warnings about the growing risk of cyber activity attributed to Iranian-aligned actors. Their message is clear: the geopolitical situation is volatile, and organisations should assume they may be in scope for retaliation. The agencies all highlight similar weaknesses being repeatedly exploited: unpatched vulnerabilities, weak identity controls, and exposed remoteaccess services.

Add alert evidence from Armis to Drata controls

Automate compliance evidence collection from Armis to Drata in under 5 minutes. Manually gathering and uploading alert evidence for compliance audits is time-consuming and error-prone. In this video, we walk through a Tines story that automatically pulls unhandled alerts from Armis and uploads them as external evidence to the matching alert controls in Drata, complete with pagination handling so no data gets missed. The result is a fully automated compliance evidence pipeline that saves your team hours of repetitive work.