Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The GitGuardian State of Secrets Sprawl 2025: Expert Panel

GitGuardian's 2025 State of Secrets Sprawl Report reveals that nearly 24 million new hardcoded secrets were exposed on public GitHub in 2024 alone–a staggering 25% increase from the previous year. Together with Chris Smith from Cyberark, our expert panel dives deep into the report's most concerning findings.

Why Manufacturing Needs SASE: Securing Smart Factories and Global Operations

Imagine you’re the Director of IT for a global manufacturing company. You must keep production sites, suppliers, and remote workers securely connected while controlling costs and meeting compliance. Every day, new challenges arise: If this sounds familiar, you’re not alone. Manufacturing is rapidly evolving with Industry 4.0, where smart factories use automation, IoT, AI analytics, and real-time data to optimize production and efficiency.

Connect to Exchange Online PowerShell

Exchange Online PowerShell is a command-line management interface for administering and automating tasks in Exchange Online, which is a part of Microsoft 365. It allows administrators to manage user mailboxes, configure organizational settings, and perform bulk operations efficiently through scripting. Here are some benefits of using PowerShell for Exchange Online management.

How to Safeguard Critical Assets from the Growing Threat of Supply Chain Cyberattacks

Organizations must develop robust programs to manage supply chain risks, both known and unknown, while prioritizing their most critical assets. Often referred to as the "crown jewels", these assets are the most valuable and vital to business success. Supply chain attacks exploit vulnerabilities in the network of suppliers, distributors, and other third-party partners to gain unauthorized access to sensitive data and systems.

An essential guide to GDPR compliance for SaaS companies

If your SaaS platform collects, processes, or stores EU residents’ data, GDPR compliance is essential to avoid regulatory issues, legal escalations, and operational interruptions. ‍ Due to GDPR’s comprehensive nature, ensuring compliance can be challenging—especially without adequate guidance. ‍ This guide provides granular information to help you start working toward GDPR compliance as a SaaS platform owner. We’ll cover: ‍

Reflecting on the Q1 Threat Landscape: Attacks & Lessons Learned

As a human risk management platform, we keep a close eye on the evolving threat landscape to help organisations detect and mitigate human cyber risks. The first quarter of 2025 has already revealed critical vulnerabilities, data breaches, and novel attack vectors that highlight the importance of proactive security measures and automated interventions. Here’s a deep dive into the major cyber security events of Q1 and what forward-thinking organisations, like yours, can learn from them.

Mission-Critical Cybersecurity with Falcon for IT

See how CrowdStrike Falcon for IT helps organizations detect, respond to, and remediate threats like state-sponsored actor LIMINAL PANDA—all from a single, unified platform. This demo walks through real-time vulnerability management, patch deployment, and DISA STIG compliance enforcement at scale. Strengthen your cyber resilience with AI-powered automation and deep visibility into your enterprise environment.