Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Defines a Top-Tier MDR Solution?

Managed Detection and Response (MDR) solutions have been available for more than 20 years, but despite this level of longevity, there remains confusion about what programs qualify as true MDR. Despite having a long track record of widespread use and success, there is still a great deal of confusion among current and potential MDR clients about what an MDR provider should deliver to keep an MDR client secure.

Strengthen Security Strategy Without Expanding Your Team: How Network Digital Twins Empower Smarter Cyber Defense

Cybersecurity is no longer just a tech issue—it's a priority that sits right at the boardroom table. With escalating cyberattacks that are becoming both more frequent and complex, the pressure is on for CIOs and CISOs. The implications of not having clear visibility into our networks can be dire. According to Cybersecurity Ventures, the financial toll of cybercrime could reach a staggering $9.5 trillion by 2024—almost three times what it was in 2015.

Active Roles innovates to provide ease of use and solve real world problems for customers

Every update to One Identity Active Roles is made in response to feedback from our customers. From adapting to improve usability or streamlining administration processes, our product development is always centered around solving the nuanced problems IT teams face every day. We’re excited to share the five recent updates we’ve made to Active Roles, including.

Kubernetes Is Powerful, But Not Secure (at least not by default)

Kubernetes has transformed how we deploy and manage applications. It gives us the ability to spin up a virtual data center in minutes, scaling infrastructure with ease. But with great power comes great complexities, and in the case of Kubernetes, that complexity is security. By default, Kubernetes permits all traffic between workloads in a cluster. This “allow by default” stance is convenient during development, and testing but it’s dangerous in production.

Critical Authentication Bypass Vulnerability in Mitel MiVoice MX-ONE

On July 23, 2025, Mitel released fixes for a critical authentication bypass vulnerability in the Provisioning Manager component of Mitel MiVoice MX-ONE, a communication platform used for enterprise voice and collaboration services. The vulnerability allows unauthenticated remote threat actors to gain unauthorized access to publicly exposed Mitel voice systems and access user or administrator accounts due to improper access controls.

Keeper Browser Extension 17.2: Biometric Login, TOTP Scanner and More

The latest update to the Keeper Browser Extension includes a number of new features like biometric login with passkeys, a TOTP scanner, clipboard expiration and for business and enterprise accounts, granular sharing enforcement notifications. In this video, I will showcase the new updates to look out for in our browser extension version 17.2.