Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Stateless vs. Stateful: The Difference in Cyber Attacks #StatefulAttack #businesslogic #apisecurity

The Hacker is Having a Conversation with Your API. There are two kinds of attacks you MUST understand: Stateless (Brute Force): One-and-done, instant gratification. Think SQL Injection. Stateful (Sophisticated): A persistent conversation over time. This is the signature of Business Logic Abuse. Why does this matter? Stateful attacks are executed by sophisticated threat actors who have done their due diligence on your architecture. You must evolve your defenses to monitor the entire session, not just single requests!

Elevating and Evolving the Role of the Channel

Nucleus Manager of Channel Enablement and Training, Tony Ramirez, talks about his recent recognition in CRN's 100 people to know for the channel. During this conversation, he also discusses the evolving role of channel leaders in cybersecurity, the importance of continuous threat exposure management (CTEM) as a process rather than a tool, and the need for contextual understanding in vulnerability management. Tony emphasizes the significance of engaging non-security stakeholders and the opportunities for the channel to educate clients on security posture and vulnerability management.

Securing and Accelerating Public Sector Networks with Cloudflare Magic WAN

Cloudflare's Magic WAN is a secure, global network service that connects enterprise locations and users with faster, more reliable performance. It replaces traditional VPNs and MPLS with a cost-effective solution, leveraging Cloudflare's extensive edge network to improve both speed and security. In this webinar, you will learn how to: Seamlessly integrate Magic WAN with Cloudflare’s security features Enhance protection against modern network threats Optimize network traffic for better performance Reduce costs compared to traditional VPNs and MPLS solutions.

How to Setup SAML SSO for Confluence Using miniOrange as Your Identity Provider (IdP)

This video tutorial walks you through the step-by-step configuration of miniOrange SAML SSO for Confluence with miniOrange as your Identity Provider (IdP). Learn how to securely integrate Confluence with miniOrange to enable seamless Single Sign-On (SSO) and centralized authentication management. With this app, you can: Enable login to Confluence using miniOrange credentials Configure robust authentication policies with miniOrange as your IdP.

How to Set Up Auto-Activation for Users in Jira | miniOrange Automated User Management

This video tutorial walks you through how to configure the automation to Auto-Activate Users in Jira using the miniOrange Automated User Management app. The video demonstrates the complete setup flow, starting with Jira automation configuration and then setting up the auto-activation rule inside the miniOrange User Management app, followed by the user flow that triggers the rule in action. Video Chapters.

Come see us at Microsoft Ignite: Live Demos & How We Optimize Your Security Stack

We're live. Cheyenne, Walter, and Cain are giving demos, answering questions, and showing how Reach helps teams optimize their security stack. Level up your knowledge and get some loot on this side quest. Come see us: Microsoft Ignite — San Francisco Booth 4037 November 18–21, 2025.

Unlocking Microsoft E3/E5 Security: How Reach Finds Hidden Gaps and Automates Remediation

New product tour who dis Most teams aren’t getting the full value out of their Microsoft E3/E5 stack — not because the tools aren’t powerful, but because the configurations are complex, scattered, and hard to operationalize. Reach maximizes your Microsoft security investment: Interrogating your current Microsoft security configurations→ Reach evaluates the current capabilities of the existing E3/E5 environment, analyzes how the current licenses are being utilized, and identifies opportunities to leverage E5 features to enhance the organization’s security posture.

Xalient Talks | The Discovery Challenge with Silverfort

In this episode of Xalient Talks, we sit down with Rob Ainscough from Silverfort to talk about the identity discovery challenge, exploring the hidden identities and blind spots that often go unnoticed. We dive into why blind spots remain a problem, how machine identities are reshaping the threat landscape, and why the industry is still playing catch up when it comes to protecting every account. Rob and Jos share insights from the field, lessons learned, and practical steps to move from discovery to protection.