Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elevating data security: Ingest data from an Azure Event Hub secured by Entra ID

If you’re just here for the practical example, skip ahead. Are you still relying on static connection strings or shared access signature (SAS) keys to protect your sensitive data streams in Azure Event Hubs? While convenient, these methods can introduce security vulnerabilities. This blog demonstrates a more secure and modern approach.

Protecting Entra ID with Veeam

If you’re not familiar with Entra, you might still think of it as “the artist formerly known as Azure Active Directory.” While its roots lie in being a cloud-based Active Directory (AD), Entra has evolved far beyond that. The name change reflects its expanded capabilities, making it much more than just AD. Many of our customers leverage Microsoft 365 or other Azure services that rely on the Entra platform.

Navigating Identity and Security in the Age of Agentic AI

As AI agents rapidly improve, becoming more autonomous and interconnected, they unlock new ways to assist us. But as they perform actions for us and delegate tasks to other AI agents, we need to reexamine our understanding of “identity.” How do we ensure these powerful AI interactions are authentic, authorized, and permissioned, while differentiating between legitimate actions and potential misuse?Join Datadog co-founder and CTO Alexis Lê-Quôc and Okta CTO Bhawna Singh as they explore the convergence of AI, security, and observability.

Identity security at inception: A CISO's guide to proactive protection

Modern enterprises are facing an identity explosion. Fueled by cloud adoption, DevOps acceleration, and now agentic AI, the number of human and machine identities is growing faster than most organizations can manage. According to the CyberArk 2025 Identity Security Landscape, 9 out of 10 organizations report a successful identity-centric breach, with relentless and sophisticated bad actors continuing to target identities. Machine identities now outnumber human identities by an astonishing 82:1.

What is Cloud Access Security Broker (CASB)?

Cloud apps make work easier, but they also open the door to new security risks. This blog unpacks everything you need to know, like: what is CASB in cyber security, how it works, and why it matters. We break down the core pillars of CASB, share real-world use cases, and help you understand the benefits it brings to your business.

DNN Integration with Salesforce: Unlocking Digital Experiences

Looking to offer a personalized experience to your website? This blog explores how to integrate DNN with Salesforce for syncing your.NET CMS with the world’s CRM. Learn how to automate lead capture, personalize web content, and streamline marketing and sales processes. Whether you're using Salesforce Marketing Cloud or want to enable Salesforce SSO with DNN, we've got you covered.

Scattered Spider Unmasked: How an identity-focused APT is redefining cyber threats

Scattered Spider has emerged as one of the most disruptive advanced persistent threats in recent years, breaching major organizations across telecom, gaming, transportation, and retail. In the last few months, the group has escalated its activity—targeting financial services and launching coordinated ransomware campaigns that have crippled operations and exposed sensitive data.

Rise of the Privileged Access Guardian: An Admin's Origin Story

Alex was the kind of IT administrator who kept everything humming smoothly behind the scenes at QuantumAxis Corp. Servers, user accounts, random requests at 4:55 PM on Fridays—he put out the fires and stayed out of the drama. So, when the CISO asked for a “quick chat,” he braced himself. “Alex,” she said, with zero preamble, “we’ve had too many close calls lately.

The quantum-AI collision: What CISOs must do now to stay ahead

Technology is moving at the speed of light, and two forces—quantum computing and AI agents—are poised to shake up cybersecurity. We’re not talking about some far-off future; this is happening now. The message for CISOs and security leaders is simple: If you’re not preparing now, you’re already behind. As we say in Brazil, “Melhor prevenir do que remediar” or “better to prevent than remediate.”