Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks

The new 2025 Insider Risk Report, produced byCybersecurity Insiders in collaboration with Cogility, highlights that nearly all security leaders (93%) say insider threats are as difficult or harder to detect than external cyberattacks. Yet only 23% express strong confidence in stopping them before serious damage occurs. The report warns that most organizations remain reactive despite a surge in AI-driven risks and the increasing prevalence of decentralized workforces.

Emerging Threat: CVE-2025-64095 - Critical Unauthenticated File Upload Vulnerability in DNN (DotNetNuke)

CVE-2025-64095 is a critical unauthenticated file-upload vulnerability affecting DNN (DotNetNuke) versions prior to 10.1.1. The flaw exists in the platform’s default HTML editor provider, where upload validation and authorization checks were insufficient. Attackers can upload files and overwrite existing content without credentials, enabling page defacement, malicious script injection, and in some environments stored cross-site scripting (XSS).

No Time to Drift: How AI Is Changing the Way Security Teams Manage Configuration Drift

In this episode of No Time to Drift, Reach CEO Garrett Hamilton sits down with Sebastian Goodwin (Chief Trust Officer at Autodesk), John Rasmussen (Senior Analyst at TAG Infosphere, former CISO at Syneos Health), and Ed Amoroso (CEO, TAG Infosphere) to unpack one of security’s most persistent challenges — configuration drift. They explore why drift happens quietly, how it compounds into real risk, and how AI-driven automation is helping teams detect, manage, and prevent drift faster — without losing human oversight or control.

Money20/20 2025 recap: Crypto is in its infrastructure era

Money20/20 has always been a window into what's next for money movement, and in 2025, crypto and stablecoins took center stage with a new energy and focus. This year, the discussions for crypto were all about infrastructure, collaboration, and building systems that last. Across sessions, one message kept surfacing: Crypto's future depends on collaboration. During our Money20/20 panel, Lee Bagan from Bridge put it best: "We're not asking if crypto can work within the system anymore.

MWC Las Vegas 2025 recap: Verified identity is pivotal for trust in communications

As Persona’s telecom lead, I've spent much of my career speaking to communications platform as a service (CPaaS) and network providers about verification and consumer protection in the wireless industry. Sometimes, it felt rare to see the telecom and identity worlds truly intersect at industry events, but at this year’s Mobile World Congress Las Vegas, that intersection was impossible to miss.

Data Security Posture Management, Early Access

Today's data sprawls across the cloud, on-prem, and endpoints. Data lives everywhere, but the biggest challenge isn't just knowing where data resides across the organization. Security teams must understand what the data represents, identify what’s at risk, and protect it in real time.

Elevate Your GRC Game: Automate Risk, Compliance & Resilience | LevelBlue + OneTrust

In today’s evolving world of Governance, Risk, and Compliance (GRC), organizations face new challenges—expanding digital boundaries, data sprawl, manual processes, and a constantly shifting regulatory landscape. “Elevate Your GRC Game” brings together LevelBlue and OneTrust to show how automation and AI can transform these challenges into opportunities. Discover the latest GRC trends—from proactive risk management and business-integrated frameworks to continuous compliance and data governance.