Microsoft has announced that multi-factor authentication (MFA) will soon be mandatory for all Azure sign-ins to bolster...
Understanding the Threat: Attackers Exploiting Native Microsoft Cloud Services
Cloud security is facing significant threats as attackers increasingly exploit native Microsoft services, including...
Lessons learned from the CrowdStrike outage
In the weeks after the CrowdStrike outage that resulted in grounded airplanes and major work disruptions across the globe,...
2024: What is the cost of a data breach today?
While security and compliance teams are improving their ability to detect and respond to breaches, threat actors are...
US data breaches and identity theft in 2024
We know that security breaches cause financial and reputational damages to organizations. But they can also severely impact...
Insights from the Snowflake Security Breach: What We Can Learn!
On May 31st, it was reported that nearly 600 million individuals were affected by two significant breaches. Ticketing giant...
How the Snowflake breach snowballed into a major security incident
With its unmatched flexibility and scalability, cloud computing has completely changed how businesses store and handle...
A little mistrust can be the right approach – The zero trust approach to security
Zero trust is a cybersecurity model that assumes no entity - whether inside or outside the network - should be trusted by...
Human and non-human identities – A simple comparison
Cloud and SaaS identities are not just about people. They also include the digital personas of applications, services, and...