Jason Costain

Jason Costain

Data Protection Specialist

Jason Costain is a security expert specializing in personal data protection. He offers rich insights into incident response planning, cloud security best practices, and the importance of multifactor authentication. With his highly applicable and easy-to-understand publications, Jason empowers his readers with the best methods to protect their sensitive data.

Security Is Your Device the New Security Perimeter?

The paradox of modern cybersecurity is that despite unprecedented levels of financial investment dedicated to digital defense, the frequency and severity of corporate data breaches continue their relentless ascent. This troubling trend points not to a lack of effort but to a fundamental

Is Your Device the New Security Perimeter?
Security Five Best Practices to Reduce SSO Access Risk

The promise of Single Sign-On (SSO) is one of elegant simplicity, a unified digital key that unlocks numerous applications and streamlines user access across an entire enterprise. This centralization is a fundamental component of modern identity and access management, offering security teams a

Five Best Practices to Reduce SSO Access Risk
Security Can Flaws in n8n Give Hackers a Skeleton Key?

In the high-stakes world of cybersecurity, the tools designed to streamline our work can sometimes become the very keys an attacker uses to unlock our most sensitive data. We're joined by Malik Haidar, a veteran cybersecurity expert who has spent years on the front lines, defending corporate

Can Flaws in n8n Give Hackers a Skeleton Key?
Security Are Hackers Exploiting Your Fortinet SSO?

The very tools designed to streamline and secure network administration can sometimes become the most potent entry points for malicious actors, turning a feature of convenience into a critical security failure. A recently uncovered vulnerability in Fortinet's Single Sign-On (SSO) functionality

Are Hackers Exploiting Your Fortinet SSO?
Security NSA Releases New Zero Trust Security Guide

As digital perimeters dissolve and sophisticated cyber threats continue to evolve, the long-standing model of a fortified network boundary has proven increasingly insufficient for protecting critical government and enterprise assets. In response to this shifting landscape, the U.S. National

NSA Releases New Zero Trust Security Guide
Security Open VSX Supply Chain Attack Steals Developer Secrets

In the world of cybersecurity, the battleground is constantly shifting. We are honored to have Malik Haidar with us today, an expert who has spent his career on the front lines, dissecting threats within some of the world's largest corporations. We'll be delving into a recent,

Open VSX Supply Chain Attack Steals Developer Secrets
Security How Will a $220M Fund Secure Ethereum's Future?

The digital fortress of the Ethereum ecosystem, which secures billions of dollars in value, has unveiled a monumental defensive strategy by establishing a $220 million endowment designed to proactively neutralize threats before they can materialize. This initiative, known as the DAO Security Fund,

How Will a $220M Fund Secure Ethereum's Future?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address