Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The MemcycoFM Show: Episode 6 - Pre-emptive Account Takeover Detection: A Five-Step Guide

Modern security leaders know that account takeover detection (ATO) isn’t just about spotting a bad login. ATO attacks are part of a broader scam lifecycle – starting with phishing or impersonation, escalating into credential harvesting, and ending with unauthorized access. To stop ATOs effectively, security teams need visibility into this full progression, not just the login attempt. That’s why a true ATO prevention strategy starts long before a password is entered.

Email Leaked to the Dark Web? Risks & Fixes Explained

Having email on the dark web is disturbing and more indicative of the fact that you are a target for cybercriminals. If your email address has been found in leaks stemming from a major data breach or somewhere due to unkept security, it makes you more vulnerable to identity theft, financial fraud, or personal extortion. But exactly what happens if your email is on the dark web?

The #1 Way Companies Get Hacked (It's Not What You Think)

Plot twist: The biggest cyber threat isn't coming from hackers breaking in... It's coming from vendors you INVITED in! Most companies only discover their third-party risks during ransomware simulations - when it's too late to fix them. Here's the uncomfortable reality: You don't know who has access to your systems You don't know what they can actually touch You're one vendor breach away from disaster.

Rewriting the Rules of Financial Services Content Management

AI and automation hold massive potential, but they can’t come at the expense of trust and control. That perspective, shared by Jerry Silva of IDC during our Financial Services Summit 2025 keynote, underscores a central tension in financial services: How do we adopt transformational technologies without undermining the very controls that define our industry? For decades, firms have operated under a familiar set of rules about compliance, security, data management, and efficiency.

Comparing MDR and MXDR: Key Differences, Suitability, and Trustwave's Solutions

As cyber threats grow in frequency and sophistication, organizations are increasingly turning to managed security services to help monitor, detect, and respond to attacks. Two prominent security solutions have emerged to these needs: Managed Detection and Response (MDR) and Managed Extended Detection and Response (MXDR). While both aim to enhance an organization's ability to detect and respond to threats, they differ significantly in scope, capabilities, and suitability for various environments.

One Identity named an identity fabrics leader by KuppingerCole

In today’s hybrid and multi-cloud environments, piecemeal identity tools can create a messy, difficult solution set. That’s why top analysts at KuppingerCole are identifying vendors that offer more than standalone solutions—they’re recognizing those that deliver a true identity fabric. We’re proud to share that in the 2025 KuppingerCole Leadership Compass for Identity Fabrics, One Identity has been named an Overall Leader in this evolving space.

FedRAMP Pen Test Scope vs. Rules of Engagement Explained

FedRAMP has strict requirements for the security of the companies looking to earn their certification. Among the many requirements you need to navigate are tests from your C3PAO, simulating malicious actors and common threat vectors. In order to understand what you need to do to pass, it’s worth going over what penetration testing is, what red teaming is, what the scope of FedRAMP pen testing includes, and what the rules of engagement encompass.

How Cloudflare Handles Privacy Certifications (and Why Containers Matter to Developers)

In this episode, host João Tomé is joined by Emily Hancock, Chief Privacy Officer at Cloudflare, Rory Malone, Principal Privacy Compliance Specialist at Cloudflare.They discuss Cloudflare's new privacy certifications. At the end, there's also Confidence Okoghenun, Senior Systems Engineer at Cloudflare, sharing the innovative Cloudflare Containers for developers.

Shift Security Left! Integrate Security Early in Your SDLC! #cybersecurity #securityteam

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.