Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Threat Actors Use Enterprise Applications in Microsoft 365 to Exfiltrate Data

Microsoft 365 (M365) has become the industry standard for business email platforms, allowing users access to a variety of interconnected productivity and communication applications. With data readily available across multiple applications within M365, threat actors are using a specific technique to exfiltrate data within a user’s M365 email account.

Humans vs AI: Building a Security Culture That Actually Works with Noora Ahmed-Moshe

As AI reshapes cybersecurity threats, understanding how scams are evolving has never been more critical. Welcome to Razorwire. I'm Jim, and today I'm talking with Noora Ahmed-Moshe, VP of Strategy and Operations at Hoxhunt. We'll explore how AI is transforming cybersecurity threats and what that means for protecting ourselves and our organisations.

How to Build a Generative AI Model in 2025

2025 is a turning point for Artificial Intelligence, particularly in generative AI. Thanks to rapid advancements, building sophisticated generative AI models has become more accessible than ever before. In this article, we'll explore how to build a generative AI model as well as best practices for its design and deployment.

Exploring Alternatives for Secure and Engaging Online Communication: Privacy and Productivity in Focus

In today's hyper-connected world, online communication is the backbone of our work, social interactions, and collaborations. However, the growing reliance on digital tools brings concerns about data security and privacy into sharper focus. Therefore, this article highlights alternatives that offer secure platforms without sacrificing ease of use or productivity.

Analyzing Ethereum's tremendous resilience: Where is the digital asset headed?

Undoubtedly, Bitcoin has been overshadowing Ethereum over the years, but it's worth noting that the latter has maintained a solid position as the 2nd largest cryptocurrency in the world, and it has a lot to offer. After all, there's a reason why it has seen enduring trader interest. Crypto enthusiasts consider Ethereum to be more than a digital asset, recognizing its intrinsic value and the numerous opportunities it offers. At the time of writing, the current Ethereum price is doing well, and the asset has succeeded in surpassing the $2,500 mark several times.

PAM360 now includes native cloud infrastructure entitlements management capabilities

We are elated to announce the successful completion of PAM360’s Cloud Infrastructure Entitlements Management (CIEM) beta program. With PAM360, ManageEngine’s enterprise PAM suite, you can now manage cloud entitlements and associated access policies from a central dashboard that enhances visibility into otherwise siloed cloud margins like never before.

Is Implementing AI Complex? What Enterprise Leaders Should Know

For most enterprises, the question isn’t whether to use AI—it’s where and how. For customers, AI enables more personalized experiences and faster response times. Employees can achieve higher productivity with more intuitive ways of working. Businesses can open new revenue streams and build competitive differentiation while strengthening security. The potential benefits are many—but realizing them isn’t a trivial matter.