Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

10 Insights from 10 Years of Okta Businesses at Work

Over the past 10 years, the Okta Businesses at Work report has shown the strength of collaboration and security apps, with Slack emerging in 2015 as the fastest growing app. In the intervening decade, we have also been through a pandemic, smartphone saturation, and an increasingly cloud-focused world that touches both work and personal lives.

The Rise of AI Agents-Collaborative Intelligence

2025 marks a pivotal moment. It’s the year AI agents transition from experimental technology to an essential business objective in enterprise operations that can enable growth and scale. These digital counterparts extend human intelligence, redefine workflows and create a new frontier in automation, cybersecurity and decision-making.

The Five Critical Components of XDR Integration: A Comprehensive Guide

As the present-day cybersecurity landscape is, cyber attacks have become more sophisticated and multi-layered in nature. Organizations are put in a greater quandary to secure their environments while juggling a range of security tools—everything from firewalls and endpoint detection and response (EDR) solutions to SIEM and SOAR platforms.

S&P 500: Which Industries Lead and Lag in Cybersecurity?

UpGuard recently published its State of Cybersecurity 2025 | S&P 500 Report, highlighting cybersecurity trends of the leading industries throughout the United States. Alongside reviewing the most impactful incidents of 2024, the report also details which industries are leading (and which are lagging) in their cybersecurity measures and risk management. With growing cyber threats from AI and software supply chain attacks on the rise, maintaining a strong cybersecurity posture is more crucial than ever.

Security First Approach to EIP-7702

EIP-7702 comes with a lot of promise for better UX, better onboarding, retail adoption, cheaper wallet operations and many more great features. The hype is real and is justified. However, it does come with a tradeoff between new capabilities and risk. The recent ByBit hack showed the consequences of inadvertently delegating control to a malicious actor.

4 Key Steps to Prevent Subdomain Takeovers

Adversaries don’t need to force their way in when they can slip through an organization’s overlooked assets. Subdomain takeovers are a prime example of how attackers exploit misconfigured or abandoned DNS records to gain access, launch phishing campaigns, distribute malware, or take other malicious actions — all while operating under the guise of a legitimate corporate domain.

Redefining Incident Response in the Modern Era

CrowdStrike Incident Response (IR) services sees firsthand why organizations facing today’s evolving threat landscape require advanced capabilities to detect, respond, and remediate cyberattacks in near real time. These observations continue to shape our approach to delivering unparalleled incident response.

Public sector data stewardship for the AI era

Artificial intelligence (AI) and generative AI (GenAI) are rapidly transforming the public sector, moving beyond theoretical possibilities to real-world applications. Proper data preparedness, stewardship, and governance will play critical roles in successful GenAI implementations. We recently hosted a webinar, Public sector data stewardship for the AI era, with industry experts Max Klaps, research director at IDC, and Dave Erickson, distinguished architect at Elastic.

Hunting with Elastic Security: Detecting covert data exfiltration

Not all network traffic is what it seems. Some flows conceal secrets, quietly exfiltrating sensitive data beyond your defenses. MITRE ATT&CK T1048 - Exfiltration Over Alternative Protocol is a stealth technique adversaries use to smuggle data out of your environment by bypassing traditional security controls.

245% Increase in SVG Files Used to Obfuscate Phishing Payloads

The KnowBe4 Threat Research team has observed a sustained increase in the use of Scalable Vector Graphics (SVG) files to obfuscate malicious payloads. SVGs are vector based, rather than pixel-based like PNGs and JPGs. This means the graphic elements can be scaled up without loss of quality - making them perfect for sharing graphics, such as logos and icons, via email.