Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Setup SAML SSO + SCIM for Jira with KeyCloak as IdP

This video tutorial guides you through setting up the miniOrange SAML+SCIM Bundle for Jira with Keycloak as your Identity Provider (IdP). Learn how to integrate Jira with Keycloak to enable secure Single Sign-On (SSO) and automate user provisioning between the two platforms. With this integration, you can: Allow users to access Jira using their Keycloak credentials Automatically provision, update, and deactivate users from Keycloak in Jira.

Extending Zero Trust to Every Endpoint

Learn how to evolve your Zero Trust strategy with expert insights from LevelBlue. As organizations grow and face new compliance challenges, securing access to data and applications is more critical than ever. In this Zero Trust webinar, our cybersecurity experts explore how to build a unified, resilient Zero Trust framework using managed security services that combine endpoint security and network security.

The Lost Payload: MSIX Resurrection

MSIXBuilder transforms what was traditionally a complex, multi-tool process into a single automated workflow that mirrors actual attacker techniques. By automatically handling certificate lifecycle management, dependency resolution, and package signing, the tool removes the technical barriers that previously prevented security teams from creating realistic test scenarios. This means defenders can quickly generate both signed and unsigned MSIX packages to validate their AppXDeployment event log coverage, confirm detection rules, and build detection coverage that actually works against real-world threats.

Advanced SOC 2 Mistakes Even Mature Companies Make

Even the most mature organizations can stumble when it comes to SOC 2 compliance. In this video, we uncover the critical SOC 2 mistakes that even experienced teams make. Did You Know? Over 68% of companies fail their first SOC 2 audit due to documentation or evidence gaps. 46% of recurring SOC 2 issues stem from poor control mapping and risk assessment misalignment. If your business handles customer data, this video is essential to ensure you stay audit-ready, trustworthy, and compliant with AICPA’s Trust Service Criteria.

Identity automation in the age of agentic AI with Matthew Chiodi

Defender Fridays - Identity Automation in the Age of Agentic AI with Matthew Chiodi Join us for this session of Defender Fridays as we explore identity automation in the age of agentic AI with Matthew Chiodi, Chief Strategy Officer at Cerby. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

We need to redefine "critical infrastructure" #cybersecurity #ransomware #criticalinfrastructure

When a city gets hit with ransomware, residents can't pay utility bills, access emergency services, or even get married. When the water treatment plant goes down, the hospital can't operate, no matter how well you've secured it. We've been asking the wrong question. Instead of "does this technically qualify as critical infrastructure?" we should be asking "who needs help?" Small organizations like schools, nonprofits, water systems, and local governments face the same cybersecurity challenges but lack the resources to defend themselves.