Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM

Gartner has recognized One Identity as a Visionary in the 2025 Gartner Magic Quadrant for Privileged Access Management (PAM). In a rapidly transforming market, innovation and demonstrated performance continue to shape expectations. The placement as a Visionary reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasis on simplified security, accelerated adoption and intelligence-driven identity protection.

Why is Cyber resilience critical in the maritime industry more than ever

From navigating hostile weather to safeguarding crew and cargo, resilience is embedded into every operational decision in the maritime industry. Today, however, a new and less visible threat is reshaping what resilience means at sea: cyber risk. Digital transformation is providing great value through satellite navigation, automation, real-time fleet management and integrated logistics. But this connectivity has also expanded the attack surface.

6 Stages in a Threat Intelligence Lifecycle: Where Does Fidelis Fit In?

Contemporary threat actors employ sophisticated methodologies to execute advanced persistent threats that may remain undetected for extended periods. The evolving threat landscape necessitates comprehensive threat intelligence programs capable of transforming raw data into strategic threat intelligence. Organizations require structured processes that enable proactive security measures rather than reactive responses to cyber threats.

What is a Remote Workforce? Key Insights and Strategies for Success

A remote workforce is defined as having employees who perform their work away from a traditional office setting. Commonly, remote employees work from home or some other location with internet access. A co-working space is another popular flexible remote work environment, offering a dedicated and professional setting outside the home or traditional office.

Iberia Airlines data breach: What customers need to know

Spain's flag carrier Iberia Airlines disclosed a significant data security incident in November 2025 that should put all customers on high alert. The breach, which occurred through a compromised third-party supplier, has exposed personal information and created new risks for travelers who have flown with the airline.

16 Days of Activism: UK Strengthens Protections Against Online Gender-Based Harms

This week marks the start of the 16 Days of Activism Against Gender Based Violence, a global campaign from 25th November to 10th December that calls for action to end all forms of violence against women and girls. For us, as a charity supporting people harmed through technology, this period is an important reminder that digital abuse is now one of the most common and damaging ways gender based violence is carried out.

Is your phone number safe? The story of how WhatsApp nearly leaked it

Vulnerability in WhatsApp revealed billions of active accounts. Avast explains, why it’s important to keep your phone number private. When we think about protecting our personal data, we often think of our home address, passwords, or banking credentials. But a recent discovery of vulnerability in WhatsApp shows that our phone numbers deserve the same caution. For many of us, WhatsApp is the go-to app for quick communication. It's where we plan family dinners, send memes, and catch up with friends.

From reactive to resilient: Transforming infrastructure management with intelligent workflows

Infrastructure has always been the backbone of IT Operations, but its scope has expanded dramatically. Gone are the days when infrastructure meant only racks of on-premise servers and storage arrays. For many businesses, today's reality is a sprawling, interconnected landscape encompassing multi-cloud environments, modern software-as-a-service (SaaS) platforms, traditional data centers, and emerging edge workloads.

Gradual by Design: What the Cloudflare Outage Reveals About Robust SASE Architecture and Operations

On November 18, 2025, a single configuration file change at Cloudflare disrupted access to large parts of the web. Around 11:20 UTC, Cloudflare’s network began returning a surge of HTTP 5xx errors. Users trying to reach services like X (formerly Twitter), ChatGPT/OpenAI, Ikea, Canva, and many others suddenly saw Cloudflare-branded error pages instead of the applications they expected. Cloudflare mitigated the issue, restored service, and published a detailed public report.