Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Rise of the Machines and the Growing AI Identity Attack Surface

In 1968, a killer supercomputer named HAL 9000 gripped imaginations in the sci-fi thriller “2001: A Space Odyssey.” The dark side of artificial intelligence (AI) was intriguing, entertaining and completely far-fetched. Audiences were hooked, and numerous blockbusters followed, from “The Terminator” in 1984 to “The Matrix” in 1999, each exploring AI’s extreme possibilities and potential consequences.

#147 - Product development with Vijay Pitchuman, Director of Product for Identity Management at Okta

On this episode of The Cybersecurity Defenders Podcast we talk about cybersecurity product development with Vijay Pitchuman, Director of Product for Identity Management at Okta.

The Human Factor in a Tech-Driven World: Insights from the CrowdStrike Outage

The idea that people are the weakest link has been a constant topic of discussion in cybersecurity conversations for years, and this may have been the case when looking at the attack landscape of the past. But we live in a new world where artificial intelligence (AI), large language models (LLMs) and deep fake technology are changing every day.

The Ultimate Bi-Directional Sync Solution - Syncito by miniOrange!

Introducing SYNCITO, our powerful bi-directional sync solution designed to simplify your data management! Why Syncito? Syncito offers effortless bi-directional synchronization across various platforms like Shopify, Salesforce, HubSpot, WooCommerce, Jira, Zoho ensuring your data is always up-to-date and consistent. No more dealing with outdated or mismatched data!

Zero Standing Privileges: The Essentials

In December, I’ll have been with CyberArk for seven years, and at a similar point, I’ll have spent two years leading product marketing for cloud security at the company. In my short tenure with CyberArk Product Marketing, I’ve advocated for zero standing privileges (ZSP) as a default mechanism for implementing privilege controls. It’s easier, more effective and doesn’t change how people work.

Guide: Verifying Microsoft Verified ID with a WordPress Plugin | Digital & Decentralized Identity

Follow our step-by-step instructions to set up and verify Microsoft Verified ID using a WordPress plugin. We’ll cover everything from plugin installation to configuration, so you can confidently manage digital identities on your site.

EP 59 - The Persistent Pursuit of Digital Transformation

In this episode of the Trust Issues podcast, Debashis Singh and host David Puner explore the intricate world of digital transformation and identity security. Debashis, the Global CIO at Persistent Systems, shares his frontline insights on the singular challenges and strategies organizations face on their digital transformation journeys.

CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons

On July 19, 2024, organizations around the world began to experience the “blue screen of death” in what would soon be considered one of the largest IT outages in history. Early rumors of a mass cyberattack were quickly squashed: it seemed a minor software update was to blame for countless shopping excursions cut short, airline flights grounded and critical surgeries postponed.