Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Importance of Connected Physical Security: A Q&A with Brivo's Aaron Wang

In a recent episode of the Talk LP News podcast, host Amber Bradley sat down with Aaron Wang, Senior Global Accounts Manager at Brivo, to dive into the current state of physical security in retail. Their conversation went beyond simple solutions, exploring the limitations of disconnected “patchwork” security systems and highlighting the benefits of a holistic, cloud-based approach.

How Exabeam Detects LLM Abuse for Google Cloud Model Armor

In this demo, see how the Exabeam New-Scale Security Operations Platform integrates with Google Cloud Model Armor to detect and stop abuse of large language models (LLMs). You’ll learn how Exabeam: Monitors AI activity for suspicious or malicious behavior Uses advanced analytics to spot LLM misuse in real time Helps security teams enforce responsible AI use policies Watch how Exabeam and Google Cloud work together to provide stronger visibility, detection, and protection against emerging threats targeting LLMs.

WP.29 and Beyond: Global Trends in Automotive IoT Cybersecurity 2025

The automotive industry is undergoing a historic transformation. As vehicles become increasingly connected, autonomous, and software-defined—including the rise of connected cars, autonomous vehicles, and advanced driver assistance systems—cybersecurity has shifted from a technical afterthought to a regulatory requirement. At the heart of this transformation lies UN Regulation No.

Master export control regulations for 2025: Effortless compliance strategies

When considering the interconnected global economy, navigating export control regulations is more critical than ever for businesses involved in international trade. These regulations are designed to protect national security, support foreign policy objectives, and prevent sensitive technologies from falling into the wrong hands. However, the increasing complexity of these rules, combined with evolving geopolitical landscapes, can make compliance challenging.

AI-Generated Attacks: What are They and How to Avoid Them?

AI-generated attacks, such as social engineering, phishing, deepfakes, malicious GPTs, data poisoning, and more, are disrupting the current security landscape speedily. But there are ways to avoid them and strengthen our defences with miniOrange IAM solutions.

AI Adoption Is Outpacing Governance: Conversations on Managing AI Risk

Executives everywhere are under pressure to deploy AI fast — but our recent roundtable on AI risk, hosted by TEISS, revealed a growing concern: AI adoption is outpacing governance, and organisations are taking on more risk than they realise. While most enterprises have mature technical controls, many are missing visibility into how AI is being used — and by whom.

Secure WordPress Login with One Click | miniOrange SAML Single Sign On (SSO) Plugin

Managing multiple logins across your WordPress environment can be frustrating for both users and teams. The miniOrange SAML Single Sign On (SSO) Plugin eliminates password fatigue by allowing users to log in once and access everything they need. Connect your dashboard, store, forum, LMS, and more through one secure, seamless login experience, powered by SAML 2.0 and trusted Identity Providers like Google Workspace (Google Apps, Okta, Salesforce, Azure AD (Microsoft Entra ID), Keycloak, ADFS, Office 365, OneLogin, Auth0, PingOne, WordPress, Oracle, JumpCloud, CyberArk, and more.

Drupal Session Management - Login Restriction

In this video, we show you how the Login Restriction feature in our Session Management module works, helping you control who can access your site. You’ll learn how to secure your website by setting rules around where and when users can log in, using IP-based restrictions to allow logins only from specific IP addresses or ranges, country-based restrictions to limit access to users from selected countries, and time-based restrictions to control logins during specific hours or days. Watch the video to see step-by-step instructions and keep your site safe and secure.