Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

No One Knows How Online Pharmacy Company was Hit with a Data Breach Impacting 2.3 Million Customers

This is a cautionary tale of both how your data can legally end up in the hands of an organization you never intended and how victims can be largely left in the dark post-breach. Normally when there’s a press release from an organization hit by a data breach, there are at least a few details that let customers know the company has a handle on what transpired, that the breach has been mitigated, and what customers impacted should do to protect themselves.

The best security events to attend in 2024, according to security pros

With security team workloads increasing year-on-year, it’s no surprise that practitioners are selective about the cybersecurity events and conferences they attend. But despite reporting high levels of understaffing and burnout, most security pros find the time to attend these events. According to the 2023 Voice of the SOC report, which surveyed 900 practitioners in the US and Europe, 81% have attended at least one conference in the past two years.

Amazon's AI Gold Rush: Profits vs. Consequences - Tackling the Hidden Costs for a Sustainable Future

Dive deep into the heart of the AI Gold Rush in our latest video as we unravel the complexities of an industry where profits are soaring, but at what cost? Andre Harwitz sheds light on a staggering revelation: a whopping 80% of generative AI startup investments are channeled into compute costs, with a single GPT 3.5 training run reaching an astounding $3.8 million.

Improving security and efficiency with IDaaS

Join Stuart Sharp, OneLogin VP of Product, as he explores Identity as a Service (IDaaS) and its role in supporting the growth of Software as a Service (SaaS). Sharp covers how IDaaS can improve identity management efficiency, help save on maintenance costs and secure user identities in the Cloud.

Unveiling the MOVEit Vulnerability

In the ever-evolving landscape of cybersecurity, staying ahead of potential threats is a perpetual challenge for businesses. One recent vulnerability that has sent shockwaves through the corporate world is the MOVEit vulnerability. This flaw, discovered in widely used file transfer software, has had a profound impact on companies across various industries.

The Role of Artificial Intelligence in Cybersecurity

The integration of artificial intelligence (AI) into various domains has become ubiquitous. One area where AI’s influence is particularly pronounced is in cybersecurity. As the digital realm expands, so do the threats posed by cybercriminals, making it imperative to employ advanced technologies to safeguard sensitive information.

Top Ransomware Trends of 2023

In recent years, the landscape of cyber threats has witnessed a dramatic shift, with ransomware emerging as a formidable and ever-evolving menace. As organizations and individuals become increasingly dependent on digital infrastructure, cybercriminals are quick to adapt their tactics, making it crucial to stay abreast of the latest trends in ransomware.

Zero Trust Architecture

Redefining Cybersecurity Perimeters Traditional security models that rely on a defined perimeter are proving to be inadequate in protecting sensitive data and systems. The increasing sophistication of cyber threats demands a more proactive and robust approach. Enter Zero Trust Architecture (ZTA), a paradigm shift in cybersecurity that challenges the conventional notion of trust within network boundaries.

What to Know About Biometric Security

Biometric authentication has emerged as a cutting-edge technology that promises to enhance the accuracy and efficiency of identity verification. Biometrics involves the use of unique physical or behavioral characteristics to confirm a person’s identity, and its applications range from unlocking smartphones to securing sensitive government facilities.