Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Essential Strategies for HIPAA Compliance and Ransomware Resilience

Neglecting regulatory compliance obligations, whether intentional or not, is not just a procedural error but a direct invitation for significant financial penalties, operational disruption, and, in the case of a healthcare organization, creating a potentially life-threatening situation. These consequences were recently illustrated by the US Department of Health and Human Services (HHS), Office for Civil Rights (OCR).

Securing AI Isn't Just About Your Pipeline #AIsecurity #DevSecOps #AppSec #redteaming

Building AI apps securely is not just about plugging tools into your dev pipeline. It’s about knowing what to do with those tools after they give you results. What risks matter? What policies should you apply? And when is the right time to integrate AI security into your CI/CD? Bar-El Tayouri sits down with Ashish Rajan from The Cloud Security Podcast to discuss why red teaming and scanning aren’t enough and how getting comfortable with AI security before production pays off long-term.

Drupal Single Sign On - Okta as OAuth Provider

This video will walk you through the steps required to configure Okta as OAuth Provider and Drupal as OAuth Client. The module allows users to log in to the Drupal site using their Okta credentials. Chapters: Don't forget to subscribe to our channel and click on a bell icon to get notifications about new uploads.

Ep 7: Everything Everywhere All At Once

The General Manager of an electric and water utility in Littleton, Mass. gets a surprise call from the FBI. At first he suspects the caller is a spammer, but soon he learns the agent is very real. Chinese hackers are lurking deep in his utility’s systems. And his is not the only one. Hundreds of other power, water and pipeline operations across the United States are getting hit. These targets have little to no intelligence value at all. But their potential for sabotage? Enormous.

Step-by-Step Guide to Real Threat Detection - Powered by Fidelis Security

In today’s threat landscape, the question is no longer “Will we be attacked?” but “How fast can we detect and respond when it happens?” The unfortunate reality is that many organizations struggle to detect threats in time—often because their tools operate in silos, their teams are overloaded with false positives, and they lack the necessary context to act swiftly and accurately.

Using CIS Hardening Scripts for Windows Server: Benefits and Risks

With each new version of Windows Server released, comes new security risks. Whilst each update enhances functionality for users, it can sometimes come at the cost of new vulnerabilities. The Centre for Internet Security (CIS) Benchmarks serve as a security baseline, helping both individuals and companies implement best practices for a secure configuration.

HR-Driven Identity and Access Management: Mini OneLogin Demo

Managing employee identities is a shared responsibility between IT and HR. OneLogin simplifies this with automated lifecycle management, connecting accurate HR data to IT systems for seamless account creation, updates and access control. Employees get fast, secure access to apps through a centralized portal.

Why does an enterprise need Endpoint Protection ?

In today's interconnected world, your endpoints are your most vulnerable targets. This video explains why every enterprise needs robust endpoint protection and introduces Fidelis Endpoint as the solution for comprehensive security. Learn how a single click from any device can compromise your entire network and why traditional security measures fail against modern, sophisticated attacks. With remote work becoming the norm, your security perimeter has expanded beyond recognition - making endpoint protection more critical than ever. Discover how Fidelis Endpoint provides.