Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

How to setup the OTP Verification plugin with Ultimate Member Login Form?

The miniOrange OTP Verification Plugin verifies the authenticity of email addresses and mobile/phone numbers during login and registration. OTP Verification sends a unique one-time password (OTP) to users, ensuring the contact details they provide are genuine and accessible. This effectively prevents fake registrations. In this video, we'll walk you through the step-by-step process of using the miniOrange OTP Verification plugin with the Ultimate Member Login Forms.

Taming Vault Sprawl with Modern Secrets Management

In this cloud, DevOps and AI era, security teams grapple with the growing challenge of shadow secrets and vault sprawl. As organizations scale, secrets management increasingly fragments. For example, Microsoft recommends using one Azure Key Vault, per application, per environment per region. Without centralized visibility, security policies and rotation control, vault sprawl leads to heightened security risk and compliance challenges.

EP 60 - Going Viral: Security Insights from TikTok's Former Global CSO

In this episode of the Trust Issues podcast, Roland Cloutier, who served as TikTok’s Global Chief Security Officer (CSO) from April 2020 to September 2022, joins host David Puner for a discussion that covers his extensive experience in the field of security. He previously held similar roles at ADP and EMC and is now a partner at the Business Protection Group.

Applying a 'Three-Box Solution' to Identity Security Strategies

Physical and network barriers that once separated corporate environments from the outside world no longer exist. In this new technological age defined by hybrid, multi-cloud and SaaS, identities are the perimeter. Any one identity—workforce, IT, developer or machine—can become an attack path to an organization’s most valuable assets.

The Rise of the Machines and the Growing AI Identity Attack Surface

In 1968, a killer supercomputer named HAL 9000 gripped imaginations in the sci-fi thriller “2001: A Space Odyssey.” The dark side of artificial intelligence (AI) was intriguing, entertaining and completely far-fetched. Audiences were hooked, and numerous blockbusters followed, from “The Terminator” in 1984 to “The Matrix” in 1999, each exploring AI’s extreme possibilities and potential consequences.

#147 - Product development with Vijay Pitchuman, Director of Product for Identity Management at Okta

On this episode of The Cybersecurity Defenders Podcast we talk about cybersecurity product development with Vijay Pitchuman, Director of Product for Identity Management at Okta.

The Human Factor in a Tech-Driven World: Insights from the CrowdStrike Outage

The idea that people are the weakest link has been a constant topic of discussion in cybersecurity conversations for years, and this may have been the case when looking at the attack landscape of the past. But we live in a new world where artificial intelligence (AI), large language models (LLMs) and deep fake technology are changing every day.

The Ultimate Bi-Directional Sync Solution - Syncito by miniOrange!

Introducing SYNCITO, our powerful bi-directional sync solution designed to simplify your data management! Why Syncito? Syncito offers effortless bi-directional synchronization across various platforms like Shopify, Salesforce, HubSpot, WooCommerce, Jira, Zoho ensuring your data is always up-to-date and consistent. No more dealing with outdated or mismatched data!

Zero Standing Privileges: The Essentials

In December, I’ll have been with CyberArk for seven years, and at a similar point, I’ll have spent two years leading product marketing for cloud security at the company. In my short tenure with CyberArk Product Marketing, I’ve advocated for zero standing privileges (ZSP) as a default mechanism for implementing privilege controls. It’s easier, more effective and doesn’t change how people work.