Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OneLogin SAML Single Sign-On (SSO) | Log into Joomla using OneLogin

Learn how to set up OneLogin SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and OneLogin, allowing users to log into Joomla using their OneLogin credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Okta SAML Single Sign-On (SSO) | Log into Joomla using Okta

Learn how to set up Okta SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Okta, allowing users to log into Joomla using their Okta credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Entra ID SAML Single Sign-On (SSO) | Log into Joomla using Entra ID

Learn how to set up Entra ID SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Entra ID, allowing users to log into Joomla using their Entra ID credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Don't Let Data DRAIN Your Budget! #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

The Value of Data Enrichment in Cybersecurity Data

You’re standing in the grocery store, comparing the nutrition information for two different cereals. The enriched wheat bran cereal has more B12 vitamin content than your favorite sugary one. As an adult, you know that your body needs the additional vitamins in the enriched bran flakes, even if you really want that fruity, sugary hit in the morning. In security, your data needs that additional hit of nutrition so you can correlate and analyze events more effectively.

Signal and TeleMessage - The 443 Podcast - Episode 330

This week on the podcast, we cover Coinbase's recent filing with the SEC that described an insider threat event that led to a ransomware extortion. After that, we dive into Signal and other secure messaging apps, how they protect communications, and how other apps can undermine those protections. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

7 Proven Tactics for Preventing Lateral Movement in Enterprise Networks

Proactive defenses are essential because attackers who breach your perimeter will relentlessly seek to move laterally across your network—compromising additional systems and exfiltrating data under the guise of legitimate traffic. In many cases, adversaries can initiate lateral movement in under two hours and remain undetected for weeks, giving them ample time to escalate privileges, pivot through infrastructure, and quietly embed themselves.

Mastering Endpoint Threat Hunting: 7 Proven Practices for Uncovering Hidden Attacks

Traditional endpoint defenses that rely solely on signatures and alerts often miss stealthy, livingofftheland attacks—studies indicate that as many as 90% of breaches begin at the endpoint and over twothirds of organizations suffer successful endpoint incursions. When these threats go undetected, they can dwell for months, resulting in data exfiltration, regulatory fines, and lasting reputational damage.

The Guide for Moving From Qualitative to Quantitative Risk Assessments

‍Once relegated to the technical corners of the organization, cybersecurity is no longer an isolated business problem that can be attended to reactively. Amid the rising costs of cyber incidents and growing regulatory scrutiny, it has become a high-level business risk that requires proactive analysis.

HIPAA Release Forms: Everything You Need to Know

A HIPAA release form is a written authorization that grants permission to disclose a patient’s Protected Health Information (PHI) to a specified third party. This form is a requirement under the Health Insurance Portability and Accountability Act (HIPAA) and plays a crucial role in protecting individual privacy rights. HIPAA regulates how personal health information can be used or disclosed by healthcare entities.