Security & Risk Management

Explore the Segura® blog with expert content and resources all about our company. See what makes us #1!

Latest articles written about Security & Risk Management

Article cover image

Understanding Identity Threats in Cybersecurity: Insights from Filipi Pires and Joseph Carson

This blog breaks down why identity is now the top target for attackers and a critical weak point in cybersecurity. It offers practical insights from Filipi Pires and Joe Carson on tackling misconfigurations, boosting visibility, and staying ahead through continuous learning.

Read the full article ›
Article cover image

Cyberattack on Brazil’s Payment System: Technical Analysis, Timeline, Risks, and Mitigation

Explore how attackers exploited C&M Software to steal millions from BMP Money Plus using valid credentials and Brazil’s real-time PIX infrastructure.

Read the full article ›
Article cover image

Risk-Based Authentication: Implementation Strategies and Best Practices

Learn how Risk-Based Authentication (RBA) works, how to implement it with PAM and PSM, and why context-aware login protection matters more than ever.

Read the full article ›