Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ISO 27001 for healthcare companies: Benefits and implementation steps

ISO 27001 is a widely used standard for protecting the security of organizations across sectors and their data through comprehensive controls. While it’s beneficial for virtually any industry, organizations in the healthcare sector often find it especially valuable. ‍ This is because they’re often subject to extensive but vaguely defined regulations, and ISO 27001 provides the structured approach to compliance they need.

SharePoint "ToolShell" zero day

Hats off to the great work the community and industry has done regarding the “ToolShell” attack against Microsoft’s On-Premise SharePoint servers. The goal of this article is to build on that great work and help Sumo Logic customers with on-prem SharePoint servers investigate and identify evidence within their environments.

The Downfall of XSS Forum

On July 23rd the notorious Russian-language hacking forum XSS.is was seized by French law enforcement agencies. Interestingly, just a few hours before the takedown, Cyberint, now a Check Point Company researchers were informed by “Loki,” a well-known moderator on BreachForums, that one of XSS’s admins had allegedly been arrested by the French. This follows a series of actions by French authorities, who have arrested BreachForums admins over the past few months.

Shifting from Vulnerability Management to Security Risk Prioritization with AI

The adage ‘an ounce of prevention is better than a pound of cure’ applies to AppSec vulnerability management. Traditionally, AppSec has focused on a reactive ‘curing flaws’ paradigm, identifying and fixing vulnerabilities after they have occurred. However, the never-ending escalation between threats and security leads to alert fatigue and security debt.

Critical Authentication Bypass Vulnerability in Mitel MiVoice MX-ONE

On July 23, 2025, Mitel released fixes for a critical authentication bypass vulnerability in the Provisioning Manager component of Mitel MiVoice MX-ONE, a communication platform used for enterprise voice and collaboration services. The vulnerability allows unauthenticated remote threat actors to gain unauthorized access to publicly exposed Mitel voice systems and access user or administrator accounts due to improper access controls.

Kubernetes Is Powerful, But Not Secure (at least not by default)

Kubernetes has transformed how we deploy and manage applications. It gives us the ability to spin up a virtual data center in minutes, scaling infrastructure with ease. But with great power comes great complexities, and in the case of Kubernetes, that complexity is security. By default, Kubernetes permits all traffic between workloads in a cluster. This “allow by default” stance is convenient during development, and testing but it’s dangerous in production.

Active Roles innovates to provide ease of use and solve real world problems for customers

Every update to One Identity Active Roles is made in response to feedback from our customers. From adapting to improve usability or streamlining administration processes, our product development is always centered around solving the nuanced problems IT teams face every day. We’re excited to share the five recent updates we’ve made to Active Roles, including.

Strengthen Security Strategy Without Expanding Your Team: How Network Digital Twins Empower Smarter Cyber Defense

Cybersecurity is no longer just a tech issue—it's a priority that sits right at the boardroom table. With escalating cyberattacks that are becoming both more frequent and complex, the pressure is on for CIOs and CISOs. The implications of not having clear visibility into our networks can be dire. According to Cybersecurity Ventures, the financial toll of cybercrime could reach a staggering $9.5 trillion by 2024—almost three times what it was in 2015.

What Defines a Top-Tier MDR Solution?

Managed Detection and Response (MDR) solutions have been available for more than 20 years, but despite this level of longevity, there remains confusion about what programs qualify as true MDR. Despite having a long track record of widespread use and success, there is still a great deal of confusion among current and potential MDR clients about what an MDR provider should deliver to keep an MDR client secure.

America's AI Action plan has arrived: 3 key takeaways that data security leaders need to know

On July 23rd, the White House released America’s AI Action Plan, a sweeping federal strategy to drive U.S. leadership in artificial intelligence. The message was loud and clear: AI is a national imperative. The plan calls for removing regulatory barriers, investing in infrastructure, and accelerating AI adoption across commercial and government sectors. For data security leaders, this signals a pivotal shift.