Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Single Sign-On (SSO) Makes Your WordPress Site Safer and Easier to Use?

Your WordPress site is more than just a website; it's the heart of your online presence. Keeping it secure and running smoothly is key to providing a reliable user experience. One way to simplify access and strengthen your site’s security is by using SAML Single Sign-On (SSO). But what exactly is SAML SSO, and how can it help protect your WordPress site? Let’s break it down.

Meet GitGuardian's AI Assistant: Natural Language Queries Across All Your Incidents

See how the GitGuardian Assistant helps teams investigate, understand, and remediate secret incidents directly from the GitGuardian workspace. In this preview, Mathieu and Dwayne walk through how the assistant uses incident context, workspace details, and GitGuardian documentation to answer questions, suggest next steps, and help manage incidents through natural language. It can explain threat patterns, assess scope and impact, recommend remediation steps, assign incidents, update tags, and propose changes to incidents.

How Attackers Use Developer Machines to Breach the Software Supply Chain - May 07, 2026

In April, three major supply chain campaigns hit npm, PyPI, and Docker Hub in just 48 hours, and while the ecosystems were different, the objective was the same: steal credentials from developer environments and CI/CD pipelines. The malware targeted API keys, cloud credentials, SSH keys, GitHub tokens, npm tokens, environment variables, and more, turning developer machines and build systems into high-value credential vaults for attackers.

The Partnerships Taking on AI Security: Daniel Bernard, CrowdStrike Chief Business Officer

The previous episode of the Adversary Universe podcast explored the “vuln-pocalypse” and the implications of advanced AI models accelerating vulnerability discovery and exploitation. Now, we’re diving into how companies are working together to face these evolving security risks. CrowdStrike Chief Business Officer Daniel Bernard spends much of his time talking with partners and customers about how to address their growing concerns: Is their business protected? Do they know which vulnerabilities are in their environment? What do they do about them?

Episode 14 - Harvest Now, Decrypt Later: The Shift to Post-Quantum Cryptography

The emergence of quantum computing has introduced a definitive expiration date for classical encryption, fueling a "harvest now, decrypt later" strategy among sophisticated nation-state actors. In this episode, Vince Stoffer joins Richard Bejtlich to demystify Post-Quantum Cryptography (PQC) and explain why organizations must move beyond a "set it and forget it" mentality regarding their encryption standards.

CVE-2026-0300: Unauthenticated Root RCE via Buffer Overflow in Palo Alto PAN-OS User-ID Authentication Portal

CVE-2026-0300 is a critical buffer overflow vulnerability in the User-ID Authentication Portal (Captive Portal) of Palo Alto Networks PAN-OS. It allows unauthenticated remote attackers to send specially crafted packets and execute arbitrary code with root privileges on affected PA-Series and VM-Series firewalls. The flaw, actively exploited in the wild since early May 2026, stems from improper handling of input in the authentication portal service.

The VMware Exodus, the DR Gap It Exposed, and Why We Built Trilio Site Recovery to Fill It

Something significant is happening across enterprise IT right now — and I do not think it has been fully reckoned with yet. More than 5,000 organizations are actively evaluating or executing a migration away from VMware. The Broadcom acquisition changed the economics of VMware dramatically and abruptly. Licensing costs surged. Bundling decisions eliminated flexibility.

What It Really Takes to Secure a Major Championship

By the time a major championship begins, almost everything that can be controlled has already been decided. The course is set. Infrastructure is locked in. Staff, vendors, broadcasters, ticketing platforms, and payment systems are all live. Millions of transactions, digital and physical, will occur in a matter of days, under global scrutiny, with no margin for error. From a cybersecurity perspective, this is not a theoretical exercise. It is an operational one.