Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protect Your Emails: Secure Sensitive Data with miniOrange DLP

Did you know that over 90% of data leaks are caused by emails? With email data breaches increasing by 50% in the past year, businesses worldwide are at risk of financial losses, legal issues, and damaged reputations. Just one accidental email sent to the wrong recipient could result in a devastating data breach. In this video, we introduce miniOrange's Advanced Outbound Email Security Solution—a powerful tool designed to protect your organization's email communication. Here’s what you’ll learn: How to block outbound emails to prevent unauthorized messages.

The Importance of Identity Threat Detection and Response (ITDR) in 2025

As cyber threats continue to evolve, organizations face a growing challenge: protecting their most critical assets – identities. With identity now at the heart of security strategies, 2025 marks a pivotal year for addressing identity-centric risks, making Identity Threat Detection and Response (ITDR) a vital component of enterprise security.

EP 70 - Zero Days and High Stakes: The US Treasury Attack

In this episode of Trust Issues, host David Puner dives into the recent high-profile cyberattack on the U.S. Treasury Department. Joined by Andy Thompson, CyberArk Labs’ Senior Offensive Research Evangelist, and Joe Garcia, CyberArk’s Principal DevOps Solutions Engineer, they explore the timeline, details and implications of the attack. Discover proactive security recommendations, insights into zero-day vulnerabilities and the broader impact on federal cybersecurity.

Magento SSO - Login into WordPress using Magento Credentials

In this Video we will learn how to configure Magento as an Identity Provider and WordPress as a Service Provider for seamless Single Sign-On (SSO) using Magento IDP extension. This integration allows users to log in to your WordPress site using their Magento account credentials.

The US Treasury Attack: Key Events and Security Implications

There’s a dark joke in cybersecurity: each year ends with an unwelcome holiday surprise—a major security incident. This timing isn’t random. Threat actors target this timing, knowing security teams operate with skeleton crews that impact detection, investigation and response times. It’s a calculated strategy that works reliably, year after year. And now there’s another holiday surprise to add to the list—the recent attack on the U.S. Treasury Department.

Protect Business Information with Data Loss Prevention (DLP)

Keeping track of your business data can be a bit of a challenge if you are using data-sharing platforms like Mediafire, WeTransfer, and Dropbox. But with DLP solutions, you can securely share your sensitive business information like files, reports, and client data on these platforms with ease while staying protected against data leaks. Want to know how? Check out this blog! That’s why it’s important to secure endpoints—basically, the devices we use every day at work.