Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Drupal Two factor Authentication (2FA) - Google Authenticator

Having a Second Factor Authentication while logging into any service we use, has become a norm these days. You also get a reward for activating or enabling MFA in some cases - which is something extra I guess. If you'd like to add this extra layer of security to your Drupal site, you're in the right place. In this video, we’ll walk you through how to configure Google Authenticator as the Two-Factor Authentication (2FA) method for End Users as well as Admins in your Drupal site.

Why Security Teams Must Rethink Incident Response for Identity Attacks

Blocking a CEO's account to stop an anomaly? It might stop your business too. When implementing Identity Threat Detection and Response (ITDR), security teams must balance robust protection and business continuity. In this clip, our expert explains why blindly blocking access can cause more damage and how identity-proofing methods, like 2FA and push notifications, offer a smarter approach. Rethink your strategy to keep security seamless.

How the 16 billion password leak impacts your security strategy

The June 2025 disclosure that over 16 billion passwords were leaked has raised significant concerns in the digital community. Reports suggest that many of these credentials are recycled from previous breaches, with a significant number used for business access. This massive data breach highlights the urgent need to strengthen password security. Don’t wait for the next breach to act. Follow these steps to safeguard your data today.

How to Block/Allow Unmanaged Devices from Accessing SaaS Applications?

Are your employees accessing apps like Google Workspace, Microsoft 365, or Salesforce from personal devices? This poses a major security risk to your business! In this video, we’ll show you how miniOrange CASB (Cloud Access Security Broker) helps you block unauthorized devices, enforce device-based access control, and secure your SaaS environment — all in real-time.

Developers fly the plane: AI guardrails for secure cloud innovation

Developers now chart courses through environments as dynamic and unpredictable as open skies, plotting efficient courses through shifting clouds of technology to reach ambitious goals. Increasingly, AI assistants are copilots on these journeys—streamlining workflows, reducing repetitive tasks, and enabling teams to navigate more complex terrain with speed.

EP 11 - The calm CISO: Strength under pressure

What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant.

Addressing Recent Vulnerabilities and Our Commitment to Security

At CyberArk, the trust and security of our customers are at the heart of everything we do. Today, July 15th, we are addressing the publication of several Common Vulnerabilities and Exposures (CVEs) related to CyberArk Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur Open Source (OSS). We regret the challenges this situation may pose to our customers and reaffirm our commitment to supporting them through the resolution process.

EP 11 - The calm CISO: Strength under pressure

What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant.

CIEM vs PAM: Which Is Better for Privileged Access Management?

CIEM vs. PAM, which one to go for? Both are cloud access management solutions, but differ in certain aspects. Where CIEM works on handling cloud entitlements, PAM focuses on securing credentials in a vault, and controlling privileged access.