Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing SSH on RHEL: 5 Essential Configuration Steps

Linux distributions, such as Red Hat Enterprise Linux (RHEL), dominate the enterprise and cloud computing sectors. One of the many reasons for the success and popularity of Linux is its support of convenient and straightforward remote access protocols, such as Secure Shell (SSH). In the right hands, SSH’s ability to securely access remote servers enables access to any Linux server, regardless of the environment. The problem is that, in the wrong hands, SSH can be a security nightmare.

How to Secure Your Business Data on Gmail, Google Drive, Docs, and more.

Are you using Google Workspace Applications to store your business data? Cyberattacks on Google Workspace are skyrocketing, but with miniOrange Google CASB solution, you can shield your business data against unauthorized access and data breaches. In this video, we’ll showcase: Learn how to secure your Google Workspace and take control of your data security today. Watch now to find out how to protect your business!

How to set up SAML Authentication for IDP?

Learn How to Set Up SAML Authentication for Your Identity Provider Using CASB In this step-by-step tutorial, we’ll walk you through setting up SAML authentication with your Identity Provider (IdP) using a Cloud Access Security Broker (CASB) via the miniOrange dashboard. What You’ll Learn: Why Use CASB with SAML? CASB adds a layer of visibility and control for your cloud services. Combined with SAML authentication, you get centralized, secure, and compliant user access management across your cloud apps.

June 9, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Proof of Concept Exploit Released for CVE-2025-32756 Further to Kroll reporting in May regarding a critical zero-day vulnerability, CVE-2025-32756 in Fortinet, is now being actively exploited in the wild, with attackers using a crafted AuthHash cookie to gain control of affected systems.

Government Data Breaches Are Eroding Public Trust - It's Time for Stronger Cybersecurity in the Public Sector

The recent data breach at the Australian Human Rights Commission (AHRC) is a stark reminder of what's at stake when public sector cybersecurity falls short. The exposure of sensitive personal information—coupled with a delayed response that exceeded the Notifiable Data Breach (NDB) Scheme's 72-hour notification benchmark—highlights systemic challenges in how government agencies prepare for, detect, and respond to cyber threats. This breach isn't an isolated event.

How to Secure AI in Your App: Mend AI for AppSec Teams

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Attacker Profiles with Behavioral Analysis

How to Fix the Challenges with Web App Firewalls A10 security experts Gary Wang and Jamison Utter explore how to uncover “Dynamic Profiles” of threat actors through advanced behavioral analysis. By leveraging regression models and historical attack patterns, they demonstrate how to detect and anticipate evolving attacker behaviors—an essential capability for staying ahead in today’s rapidly shifting threat landscape.