Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OneLogin SAML Single Sign-On (SSO) | Log into Joomla using OneLogin

Learn how to set up OneLogin SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and OneLogin, allowing users to log into Joomla using their OneLogin credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Entra ID OAuth Single Sign-On (SSO) | Log into Joomla using Entra ID as OAuth Client

Learn how to set up Entra ID OAuth Single Sign-On (SSO) with your Joomla website using our Joomla OAuth Client extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Entra ID, allowing users to log into Joomla with their Entra ID credentials using the OAuth protocol. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Entra ID SAML Single Sign-On (SSO) | Log into Joomla using Entra ID

Learn how to set up Entra ID SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Entra ID, allowing users to log into Joomla using their Entra ID credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Bootstrapped, Battled, and Built The Rise of miniOrange

What does it take to quit a stable job, reject an overseas offer, and start from zero, all for a dream? In this powerful conversation, �������������� ����������������, Founder and CEO of miniOrange, shares his raw, real, and remarkable journey: Whether you're an aspiring founder, a cybersecurity professional, or someone looking for purpose, this is a must-watch.

Federal IT Modernization: Balancing Efficiency with Advanced Cybersecurity

As 2025 unfolds, U.S. federal agencies are navigating significant operational shifts that are impacting their overarching cybersecurity strategies. Government security leaders have always emphasized stringent cybersecurity practices in the face of dynamic threats.

The Rise of Identity-Based Attacks and How Deception Can Help

Identity-based attacks have become the predominant vector for sophisticated threat actors targeting enterprise networks, particularly those using Microsoft Active Directory. Active Directory (AD), which serves as the authentication and authorization framework in over 90% of organizations, represents a critical attack surface that, when compromised, provides adversaries with extensive capabilities for lateral movement, privilege escalation, and data exfiltration.