Bert Blevins


Bert Blevins press releases

  • New Creative Post Simplifies Cloud Security Models for Everyone Houston, Texas – July 25, 2025 – In a world where cloud security and service models can often feel complex and intimidating, Bert Blevins is making things a lot easier to digest. With a clever new analogy, Blevins illustrates the differences between SaaS, PaaS, and IaaS using something that everyone can relate to—food! Check out his latest post on LinkedIn, where he compares the three major service models to familiar...

  • Houston, Texas – July 25, 2025 – As the era of AI-driven audio deepfakes emerges, cybersecurity faces an unprecedented challenge. The latest analysis from the "Rising Threat of Digital Voice ID Misuse" report highlights a growing concern for businesses and consumers alike: the exploitation of voice ID authentication by cybercriminals to perpetrate large-scale fraud. Bert Blevins, spokesperson for the report, shares valuable insights into this alarming threat: "Voice ID misuse has become a...

  • Houston, Texas – July 25, 2025 – In today’s fast-paced digital landscape, understanding cloud security can feel like navigating through a maze. But thanks to the brilliant minds at identitysecurity.net, complex cybersecurity concepts have never been more accessible—or fun! Bert Blevins, a cybersecurity expert, shared a fresh and engaging way to approach SaaS, PaaS, and IaaS in a recent LinkedIn post. He creatively likens these models to travel experiences, making them both...

  • Houston, Texas – July 23, 2025 – In today’s rapidly evolving digital landscape, securing your organization's operations is more critical than ever. Service accounts play a vital role in providing automated access to systems and applications. However, the selection and management of these accounts can pose significant security risks if not done properly. Bert Blevins, a cybersecurity expert, emphasizes the importance of selecting the right service accounts—whether...

  • Houston, Texas – July 23, 2025 – In today's digital age, cybersecurity breaches are an ever-present threat to organizations of all sizes. With vulnerabilities like outdated software or phishing attacks, businesses are increasingly at risk of having their sensitive data compromised. These breaches can have devastating consequences, from financial loss to long-term damage to an organization’s reputation. The importance of a swift and effective response cannot be overstated. Having a...

  • New Security Threat: CVE-2025-53770 & CVE-2025-53771 Exploit Chain Threatens SharePoint Servers Worldwide Houston, Texas – July 23, 2025 – SharePoint administrators, take notice: a critical vulnerability exploit chain, leveraging CVE-2025-53770 (CVSS 9.8) and CVE-2025-53771, is currently targeting on-premises SharePoint Servers, with over 85 servers compromised globally. Attackers are utilizing this unauthenticated Remote Code Execution (RCE) vulnerability to steal sensitive data and...

  • Houston, Texas – July 22, 2025 –To achieve the highest levels of security and compliance, running a robust Privileged Access Management (PAM) solution is imperative. In today's digital age, organizations must secure their critical systems by managing and monitoring privileged access effectively. As Bert Blevins, a leading cybersecurity expert, highlights in his latest LinkedIn post, "Top Activities & Tasks for Running PAM", several critical tasks are essential for maintaining a secure...

  • Houston, Texas – July 22, 2025 – In today's rapidly evolving digital landscape, ensuring a robust cybersecurity posture is paramount. Privileged Access Management (PAM) is an essential aspect of this defense strategy, but organizations often make common mistakes that can undermine their security. Bert Blevins, a seasoned expert in cybersecurity, shares valuable insights on how companies can avoid these pitfalls and enhance their cybersecurity measures. One of the biggest mistakes...

  • Houston, Texas – July 21, 2025 – In the ever-evolving landscape of cyber threats, cybercriminals are increasingly turning to steganography to exploit unsuspecting users. By embedding cryptominers and backdoors in WAV and MP3 audio files, these attackers are leveraging the trust we place in file-sharing to infect devices. This method of attack goes undetected by many traditional cybersecurity measures and poses a significant risk to businesses and individuals alike. In response to this...

  • Houston, Texas – July 21, 2025 – In today's increasingly digital world, safeguarding sensitive data has never been more important. As organizations continue to embrace digital transformation, ensuring compliance with industry-leading frameworks like NIST, ISO 27001, and GDPR has become essential to managing risk and securing critical assets. Robust Privileged Access Management (PAM) solutions offer organizations the ability to comply with these regulatory requirements while securing...

  • Houston, Texas – July 21, 2025 – In today’s increasingly complex digital landscape, businesses must safeguard their most sensitive data and systems with the highest level of security. Privileged Access Management (PAM) plays a critical role in preventing unauthorized access to critical resources, but companies often make common mistakes that undermine their security posture. Key PAM Mistakes to Avoid: Neglecting Approval Workflows: Without proper approval processes in...

  • Houston, Texas – July 20, 2025 – In today’s rapidly evolving cybersecurity landscape, securing critical systems is more important than ever. That’s why we are excited to present our latest resource – an in-depth video guide on Privileged Access Management (PAM) – designed to help you bolster your organization's security posture. PAM plays a crucial role in protecting sensitive systems by providing complete control over credentials, session monitoring, and access...

  • Houston, Texas – July 19, 2025 – In today's rapidly evolving cybersecurity landscape, safeguarding your organization’s sensitive information is more important than ever. Privileged Access Management (PAM) is a vital tool to ensure that only authorized personnel have access to your most critical systems and data. We are thrilled to announce the launch of a new video guide that delves deep into PAM essentials. This guide covers everything from credential management, session...

  • Houston, Texas – July 19, 2025 – Today, Bert Blevins, a cybersecurity expert, announced the release of a new video guide designed to help organizations protect their most critical systems through Privileged Access Management (PAM). As businesses face growing security threats, ensuring that only authorized individuals can access sensitive systems is more critical than ever. In this informative video, Bert covers essential practices for securing privileged accounts, including credential...

  • Houston, Texas – July 18, 2025 – In today’s rapidly evolving cyber threat landscape, safeguarding your organization’s critical systems has never been more important. Privileged Access Management (PAM) provides a powerful solution for securing your most sensitive data and resources. To help you better understand PAM and its essential role in enhancing security, we’ve released a comprehensive video guide. Our new video guide covers: Credential Management: Ensure that only...

  • Houston, Texas – July 18, 2025 –  As organizations continue to prioritize data security in an increasingly connected world, understanding the different encryption protocols used to secure data transmission is crucial. Bert Blevins, an expert in network security, highlights the importance of selecting the right encryption protocol to ensure secure communications within your organization. In his latest post, Bert dives into the key differences between TLS (Transport Layer...

  • Houston, Texas – July 18, 2025 In today’s rapidly evolving digital landscape, protecting sensitive data has never been more crucial. With cyber threats becoming increasingly sophisticated, it is essential for businesses and individuals to understand the various threat vectors that can compromise their security. Key vulnerabilities such as weak authentication, unpatched systems, and phishing are common pathways for cyberattacks, putting your sensitive data at risk. As organizations and...

  • Houston, Texas – July 17, 2025 – Delinea, a leader in Privileged Access Management (PAM) solutions, has introduced a groundbreaking feature, Just-In-Time (JIT) Access, which transforms how organizations manage privileged access. With JIT Access, Delinea grants temporary, context-specific privileges, significantly reducing the attack surface and enhancing overall security posture. This innovative feature minimizes the window of exposure for critical systems, ensuring that only the right...

  • Houston, Texas – July 17, 2025 – In today's ever-evolving cyber threat landscape, ensuring the security of your critical systems is more important than ever. That’s why we are proud to offer a comprehensive guide to Privileged Access Management (PAM), a vital security framework designed to safeguard your organization’s most sensitive information. Our latest video, led by cybersecurity expert Bert Blevins, explores how PAM protects your systems through effective credential...

  • Houston, Texas – July 16, 2025 – In today’s fast-evolving cyber threat landscape, embracing Privileged Access Management (PAM) as an ongoing process, rather than a one-time task, is crucial to staying ahead of malicious actors. At BertBlevins.com, we understand that cyber security is not just about reacting to threats but proactively managing risks and reducing vulnerabilities over time. By committing to regular audits, proactive risk management, and ongoing employee...