Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JumpCloud Acquires Stack Identity, Paving the Way for Identity-First Security

JumpCloud Inc. is continuing its identity-first momentum by acquiring Stack Identity. Stack Identity is a next-generation identity security and access visibility platform. This acquisition strengthens JumpCloud's identity-first access management solution.

PCI DSS in Australia : Securing Payment Data for E Commerce and Finance

Welcome to our in-depth guide on PCI DSS in Australia: Securing Payment Data for E-Commerce and Finance! In this video, we explore the Payment Card Industry Data Security Standard (PCI DSS) and its critical role in protecting sensitive payment information for businesses in Australia. Key Topics Covered.

Securing Your Digital Footprint While Traveling in 2025

In an increasingly connected world, travel relies more on technology than ever. While digital tools enhance convenience, they also create new opportunities for cyber threats. Phishing attacks and malicious links targeting mobile devices are projected to triple compared to previous years as cybercriminals exploit public Wi-Fi networks and insecure booking platforms. To navigate these challenges, it’s essential to secure your digital footprint proactively.

The Skills Gap in Identity Security: How AI and Automation Are Bridging the Divide

The growing demand for cybersecurity talent is outpacing the supply of skilled professionals, and this is especially true in the field of identity security. With cyber threats becoming more sophisticated and the number of identities within organisations expanding, companies are struggling to find qualified experts to manage and protect sensitive data. The challenge of filling Identity and Access Management (IAM) roles is becoming a major barrier for businesses looking to stay ahead of cybercriminals.

Grandfather-Father-Son Backup Explained

Protecting critical business data requires a reliable backup system that works consistently. The grandfather-father-son (GFS) backup rotation offers a structured approach through organized daily, weekly, and monthly backup cycles. The GFS backup scheme creates multiple recovery points, giving businesses flexibility when restoring data after unexpected issues.

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats

This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. APT34, also known as OilRig, Earth Simnavaz, and Helix Kitten, is a sophisticated, state-sponsored cyber threat group with suspected ties to Iran.