Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Setup SAML SSO + SCIM for Jira with KeyCloak as IdP

This video tutorial guides you through setting up the miniOrange SAML+SCIM Bundle for Jira with Keycloak as your Identity Provider (IdP). Learn how to integrate Jira with Keycloak to enable secure Single Sign-On (SSO) and automate user provisioning between the two platforms. With this integration, you can: Allow users to access Jira using their Keycloak credentials Automatically provision, update, and deactivate users from Keycloak in Jira.

How to Prevent Cross-Site Scripting (XSS) on Payment Pages

Many teams believe that cross-site scripting, or XSS, is a problem of the past. Modern frameworks promise built-in protections, and developers often assume the browser will handle the rest. The reasoning sounds logical: if React auto-encodes output, XSS can’t happen. However, XSS prevention doesn’t work on assumptions; it works on visibility. We’ve learned that XSS prevention is about maintaining continuous control over the browser environment where your application runs.

The Business Case for Investing in AppSec Tools

Relying on disjointed, manual security processes creates bottlenecks that delay software releases and increase business risk. As development accelerates, security teams struggle to keep pace, leading to a rise in security debt and a greater likelihood of breaches. Investing in the right AppSec tools is no longer a technical decision; it is a strategic business imperative.

Enhancing Disaster Recovery for Red Hat OpenShift with CloudCasa and Red Hat OpenShift on AWS (ROSA)

Building resilient infrastructure is a must for modern organizations operating across hybrid environments. As applications move between on-premises and the cloud, ensuring data protection and continuity becomes a key priority. Red Hat OpenShift offers a consistent platform for running containerized and virtualized workloads across hybrid environments.

Extending Zero Trust to Every Endpoint

Learn how to evolve your Zero Trust strategy with expert insights from LevelBlue. As organizations grow and face new compliance challenges, securing access to data and applications is more critical than ever. In this Zero Trust webinar, our cybersecurity experts explore how to build a unified, resilient Zero Trust framework using managed security services that combine endpoint security and network security.