Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

Critical Access Controls: Ensuring Database Security

Securing database access has become a critical concern for organizations globally. Your organization’s data is its most valuable asset, encompassing everything about your business, partners, customers and employees. A data breach could jeopardize your entire operation.

EP 62 - The Evolution of Identity

In this episode of the Trust Issues podcast, host David Puner sits down with Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral guidance on identity-centric security strategies to help organizations reduce the risk of identity-related attacks. They explore the evolution of digital identity, discussing how it has transformed from simple identifiers to complex, multifaceted digital identities for both humans and machines.

Microsoft Exchange MFA for Outlook Desktop and Mobile Apps

Microsoft Exchange and Outlook Web App (OWA) are essential tools for enterprise communication, providing seamless access to emails, calendars, tasks, and contacts. However, with increasing cyber threats, relying on just usernames and passwords leaves your accounts vulnerable. miniOrange offers a robust Multi-Factor Authentication (MFA) solution for Exchange and OWA, adding an extra layer of security by requiring users to verify their identity through multiple methods. Even if credentials are compromised, MFA ensures your accounts remain protected.

Zero Standing Privileges (ZSP): Vendor Myths vs. Reality

Several new vendors entering the privileged access management (PAM) market are boldly claiming they can – or will soon be able to – provide access with zero standing privileges (ZSP). In reality, these lofty vendor claims likely ignore the limited use cases of their own technology. This betrays a fundamental misunderstanding of PAM – the most challenging problem in cybersecurity.

How Investronaut Secured Digital Transformation with CyberArk Identity Solutions | CyberArk

Discover how Investronaut, one of India's fastest-growing digital marketing agencies, enhanced its operational efficiency and security by partnering with CyberArk. In this video, we explore how Investronaut leveraged CyberArk's Single Sign-On (SSO), Adaptive Multi-Factor Authentication (MFA), and Workforce Password Management (WPM) to safeguard its digital transformation amid a rapidly evolving threat landscape.

How to configure Joomla Custom REST API Plugin

The Joomla Custom API plugin lets you create custom APIs to expand the capabilities of the Joomla CMS (Content Management System). By using these APIs you can expose particular features or data from your Joomla website, allowing external programs or services to communicate with your Joomla website. With the help of the custom endpoints you have developed, this plugin offers a smooth method to work with the Joomla database, enabling you to easily carry out CRUD (Create, Read, Update, and Delete) operations.

Sync Products from Amrod to WooCommerce | Integrate Amrod and WooCommerce

In this video, we’ll walk you through the step-by-step process of setting up the miniOrange WooCommerce Product Sync plugin on your WordPress site to seamlessly sync products from Amrod to WooCommerce. Whether you're a beginner or an experienced user, this tutorial will make it easy for you to manage your online store's inventory efficiently.

Tricentis Tosca Secrets Manager Integration with CyberArk Software

- In this video, we explore the integration between Tricentis Tosca and CyberArk, demonstrating how to securely store and manage sensitive data, such as passwords and multi-factor authentication (MFA) keys, directly in CyberArk. Learn how to seamlessly access this data in your test cases and configurations when needed. This integration ensures enhanced security for your test automation by centralizing sensitive data management within CyberArk. Be sure to subscribe for more tutorials on test automation and security best practices!