From Retail Floors to Virtual Cores: ESXi Is the Next Attack Vector in Retail
Blog Published: 09/25/2025
In April 2025, a ransomware attack on Marks & Spencer paralyzed its core systems by encrypting its VMware ESXi hypervisors. The breach halted online sales, disrupted logistics, and left customers in limbo. With damages estimated at over $400 million, the attack revealed a growing trend i...
Introducing the SaaS Security Capability Framework (SSCF) v1.0: Raising the Bar for SaaS Security
Blog Published: 09/24/2025
Why SaaS Security Needs a Rethink SaaS has changed everything. From collaboration tools to critical business applications, SaaS is now the default way organizations consume technology. But with this massive shift comes a big problem: security hasn’t kept up. Most Third-Party Risk...
The Salesloft Drift OAuth Supply-Chain Attack: Cross-Industry Lessons in Third-Party Access Visibility
Blog Published: 09/25/2025
Abstract The August 2025 Salesloft Drift breach demonstrates a systemic security blind spot across all industries: third-party delegated access through OAuth integrations. Over 700 organizations — including financial institutions, technology companies, healthcare providers, and government ag...
Columbia University Breach Exposes 870,000 Records: The Case for Unified Cloud and SaaS Security
Blog Published: 09/29/2025
When news broke that Columbia University suffered a cyberattack affecting nearly 870,000 individuals, the scale immediately caught attention. The breach not only exposed personal and academic records but also highlighted the growing risks universities face as they rely on complex combination...
Zero Trust Architecture: Principle Driven Security Strategy for Organizations and Security Leaders
Blog Published: 09/30/2025
“Zero Trust Architecture in today’s complex multi-cloud environments provides an effective way to ensure Cyber Resilience and effectively address cyber threats. While the leading organizations and security leaders continue to adopt this change, this article aims to equip them with essential ...
Aligning Risk-Based Security with Business Goals: Bridging the Gap Between IT and Leadership
Blog Published: 09/30/2025
Cybersecurity has evolved from a technical concern to a strategic imperative. For industries like finance, healthcare, retail, and manufacturing, where breaches can devastate operations and reputation, the stakes have never been higher. Rising cyberattack frequency and stringent regulations ...
From Compliance to Culture: What CISOs Need to Know About Evolving SAT
Blog Published: 10/02/2025
For years, security awareness training (SAT) has been treated like a checkbox—an annual task to meet compliance requirements. But cyber threats have grown more sophisticated, targeting people over infrastructure and exploiting human behavior instead of technical flaws. For CISOs, t...
Role Engineering for Modern Access Control
Blog Published: 10/01/2025
In theory, Role-Based Access Control (RBAC) is elegant. In practice, it’s often anything but. Over time, even the most disciplined identity programs fall prey to the usual culprits: role creep, stale entitlements, convoluted hierarchies, and a sprawling mess of redundant or overlapping roles...
AI Log Analysis for Event Correlation in Zero Trust
Blog Published: 09/26/2025
Modern enterprises generate oceans of logs that span on-prem, cloud, IoT, and OT. Think identity, device, data, network, and application events. Logs are the backbone of visibility, but logs alone do not provide actionable insights. They become powerful when analyzed and correlated for threa...
Why Data Protection Is Now a National Security Matter: Understanding the Bulk Data Rule
Blog Published: 10/06/2025
The National Security Division (NSD) of the U.S. Department of Justice (DOJ) issued a Final Rule announcing a new Data Security Program (DSP) under Executive Order 14117: Preventing Access To Americans' Bulk Sensitive Personal Data And United States Government-Related Data By Countries Of Co...
What Does Quantum Computing Mean for MFT?
Blog Published: 10/07/2025
Ask most people what the biggest threat in IT is, and they’ll say “AI” — hailed for productivity and feared for job loss. Yet the more consequential risk may be waiting offstage. Quantum computing, a field overshadowed by the AI frenzy, has the power to render current cryptography algorithms ...
How Event-Based Identity Management Can Enable Dynamic Security
Blog Published: 10/08/2025
Identity has undergone a remarkable transformation in recent years. Sophisticated multifactor authentication (MFA) methods have emerged, with passkeys becoming the latest technology capable of replacing weak passwords. Identity management systems connect vast networks of devices, systems, an...
When OAuth Tokens Go Rogue: Lessons from the Salesloft–Drift Breach
Blog Published: 10/08/2025
In August 2025, attackers exploited the Salesloft-Drift OAuth integration to compromise over 700 organizations’ Salesforce instances. This wasn’t a direct vulnerability in Salesforce, but rather an ecosystem failure highlighting how SaaS supply chains, OAuth tokens, and identity gaps have bec...
From Automation to Augmentation: The Future of SOCs in Enterprise Cybersecurity
Blog Published: 10/09/2025
The sophistication and continuous threat of cyberattacks have outpaced manual response times, and enterprises are confronting a pivotal truth: the era of reactionary cybersecurity is over. Traditional Security Operations Centres (SOCs) are no longer enough, while businesses are now requiring ...
5 Reasons Disconnected Apps Are An Enterprise Risk You Can No Longer Ignore
Blog Published: 10/15/2025
Companies of every size depend on Identity and Access Management (IAM), Identity Governance and Administration (IGA), and Privileged Access Management (PAM) to secure logins, enforce policies, and meet compliance requirements. These platforms are the backbone of modern identity security. Bu...
SOC Analyst Fatigue: What Our Data Says About Sustaining Investigation Speed and Quality
Blog Published: 10/10/2025
If you run or staff a SOC, you already know the story: the longer the shift, the sloppier the notes, the more steps get skipped. The cognitive fatigue hits hard. In CSA’s new benchmarking study, we looked at something teams rarely measure directly: Whether analysts can sustain thoroug...
Beyond AI Principles: Building Practical Transparency for Cybersecurity
Blog Published: 10/14/2025
Executive Summary: Bridging the AI Trust Gap with Practical Transparency Artificial intelligence systems are rapidly becoming a cornerstone of modern cybersecurity. Yet, a fundamental challenge persists: how do you secure what you can't fully understand? The opacity of "black box" AI system...
What Is Model Context Protocol (MCP)?
Blog Published: 10/15/2025
A new language for AI GenAI adoption is becoming more widespread in the enterprise. As a result, we are seeing a growing complexity of AI models and systems. LLM use is evolving into the next iteration of AI innovation: autonomous agents capable of learning, reasoning, and acting independe...
When Simple DNS Mistakes Lead to Big Attacks: Lessons from the MikroTik Botnet
Blog Published: 10/21/2025
Cybersecurity is often seen as a battle against highly complex exploits. Yet, some of the most impactful attacks begin with the smallest mistakes. A recent discovery of a large-scale botnet highlights just how dangerous small DNS misconfigurations can be. The Attack: Hijacked Router...
Cyber Defense Cannot Be Democratized
Blog Published: 10/17/2025
The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called democratization of security, on the other hand, has resulted in chaos. The problem In an earnest attempt t...