Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automated provisioning and governance for healthcare company, B Braun

Join B Braun representatives Andreas Müller, IT project manager, and Michal Kasynski, identity manager engineer as they explore their choice of One Identity Manager for their healthcare and pharmaceutical company’s identity governance and administration (IGA) needs.

Ep 14: Security IS observability: Prove us wrong

In this episode, we discuss the critical intersection of security and observability within organizations. We highlight the often contentious relationship between security analysts and SREs, emphasizing the importance of fostering a collaborative culture to effectively address incidents. All teams should focus on solutions rather than blame, as user experience is affected by both security and infrastructure issues. We explore how to break down silos, especially in the context of AI security, and encourage cross-disciplinary learning to enhance overall security practices.

Smart Devices | #CybersecurityAwarenessMonth

The usage of smart devices is quickly surging. In the 8th episode of the Little lessons in cybersecurity series, let's stop for a minute and look at how these devices can be exploited by hackers and how we can be vigilant with them. Head to the link here for some more interesting takes on casual habits that invite cyberthreats.

Active Exploits Target Oracle EBusiness Suite (CVE202561882)

A critical zero‑day (CVSS 9.8) in Oracle E‑Business Suite (EBS) versions 12.2.3 – 12.2.14 (CVE‑2025‑61882) allows unauthenticated remote code execution (RCE) via the BI Publisher Integration in the Concurrent Processing module, actively exploited in the wild by Cl0p and other threat actors.

Netwrix AI - Accelerating Your Path to Data & Identity Security

Join us for Day 2 of the Netwrix Innovation Week Podcast Series, part of Cybersecurity Awareness Month. In this episode, Grady Summers and Jeff Warren discuss how Netwrix is building AI into the 1Secure Platform to help security teams gain faster insights, automate remediation, and stay in control. They also explore how we’re using AI responsibly to keep customer data private, protected, and within your control.

Azure Identity & Access Fundamentals | Sedara Cyber Bytes 2025

Learn how to strengthen your Microsoft cloud security in this recorded session of Sedara’s Cyber Bytes 2025 - Azure Identity & Access Fundamentals. In this workshop, Jason Taylor breaks down how identity and access management works in Microsoft Entra ID and Azure, explains the key differences between Entra and Azure roles, and shares best practices for securing your organization’s cloud identities.

From Noise to Action: Smarter Security Ops That Reduce Risk

In this episode of Logs & Lattes, host Palmer Wallace talks with Rich Murphy, Senior Product Manager at Graylog, about how smarter security operations help teams cut through the noise and focus on what truly reduces risk. From alert fatigue to risk-first response, they unpack practical ways to prioritize real threats, automate with context, and make incident response faster and more effective. Learn how modern SOCs are evolving beyond alert overload to focus on meaningful, risk-based action.