Secure SSO: How Multi-Factor Authentication Strengthens Single Sign-On Security

The most common first move in a modern cyberattack isn't a zero-day exploit or a piece of custom malware. It's a username and a password. Attackers know that credential theft is the fastest path into an enterprise network. And when an organization implements Single Sign-On (SSO), that path gets shorter. One stolen credential equals access to dozens of applications.

A Look At GitGuardian's ML-Powered Contextual EnrichmentAnd Incident Scoring

In this quick introductory video, Mathieu Bellon, Senior Product Manager at GitGuardian, sits down with Dwayne McDaniel, Developer Advocate, to cover some of the advancements GitGuardian has made by integrating machine learning directly into the secrets security platform. Mathieu describes how engineers and responders can save serious time as by automating contextual analysis, geving the humans in the loop with the best information to be able to take an informed action when it comes to secrets leaks. They also discuss the security implications and where teams can look if they want to opt out or bring their own agents.

Diving Into Quasar RAT: TTPs, IoCs and more

Quasar, crafted in the C# programming language, is a publicly accessible and open-source Remote Access Trojan (RAT) designed for Microsoft Windows operating systems (OSs). This creation comes courtesy of the GitHub user MaxXor and resides as a publicly hosted repository on GitHub. While its utility extends to legitimate applications like enabling remote assistance from an organization’s helpdesk technician, Quasar is being exploited by APT actors for cybercrime and cyber espionage endeavors.

"It's Quite a Shock": The Quantum Deadline Is Real

In this World Quantum Day special edition of This Week in NET, host João Tomé is joined by Bas Westerbaan (Principal Research Engineer) and Sharon Goldberg (Senior Director, Product) to explain why the timeline for post-quantum cryptography may be arriving sooner than expected. Recent research suggests the number of qubits required to break today’s encryption could fall dramatically, accelerating the urgency for companies and the Internet ecosystem to migrate to post-quantum security. Google has set a 2029 migration target, and Cloudflare is working toward a similar timeline.

How to Build a Security Compliance Audit Process that Works All Year Round

Security compliance audits can feel intimidating, especially if your team has never been through one before. For many organizations, an audit feels like a high-pressure project with a hard deadline, a long list of evidence requests, and a lot of manual work spread across security, IT, legal, and compliance teams. For vendors and companies in highly regulated industries, audits and risk assessments may already be a routine part of doing business.

Why Automotive & Manufacturing Can't Afford to Delay Key Management Strategy

In automotive and manufacturing, digital transformation is no longer a future ambition—it’s operational reality. Connected vehicles, smart factories, and increasingly complex supply chains have introduced a new dependency: trusted device identity and secure key management at scale. And yet, many organisations are still: This gap is no longer just a technical issue—it’s a business risk.

How To Build an Effective IT Disaster Recovery Plan

When weather forecasters predict hurricanes and blizzards, people rush to the grocery store for bread, milk, snacks, and water. While the snacks may be part of the storm preparation, the bread, milk, and water are part of the post-storm recovery. People know that they may experience power outages, water service disruption, or difficulty getting to stores. In short, the people plan how to recover in a disaster’s aftermath.