February 2025 Newsletter

February 17, 2025
Share on Bluesky

February 2025 Newsletter

We're back with exciting new updates!

Table of Contents

  • Lessons from the CyberArk Employee Risk Survey

  • Product Deep Dives: Testing Pomerium UDP Tunnels with Factorio

  • Why AI Companies Are Different

  • New at Pomerium: Newsletters & Social Media

  • January 2025 Security Breaches  


The Human Factor in Security:

Lessons from the CyberArk Employee Risk Survey

“Only amateurs attack machines; professionals target people.”
- Bruce Schneier, public-interest technologist

The CyberArk 2024 Employee Risk Survey revealed that employees remain a prime target for attackers. This aligns with the longstanding consensus in security research that the “weakest link” isn’t the technology—it’s the people using it. 

The CyberArk survey is a reminder of the urgent need for adaptive, context-aware mechanisms. The goal is to make secure choices feel natural, not burdensome—something for which user experience experts have long advocated. 


Product Deep Dives

Stay updated on Pomerium's capabilities!

Testing Pomerium UDP Tunnels with Factorio

Pomerium supports tunneling UDP traffic! Follow this step-by-step guide on how to test Pomerium UDP Tunnels using Factorio.


The New Frontier:

AI Companies Require New Approaches to Security

AI companies may share some commonalities with other tech-forward organizations, but they are fundamentally different. The industry is unlike anything we’ve seen before, and AI companies face evolving and unprecedented challenges and dynamics that make their security and operational needs fundamentally different from those of other industries. 

Pomerium has partnered with some of the most forward-thinking, foundational leaders in the AI space. Their challenges are unique, and recognizing that difference is the first step toward building security solutions that work for them, not against them.

🆕 at Pomerium

Newsletter Webpage

If you're reading this, congratulations! You're already subscribed to our monthly newsletter, and you're the first to be notified of Pomerium news and updates!

You can now find all of our past newsletters in one place.

Social Media Platforms

We're officially active on SEVEN platforms, and we're now hosting casual work sessions and formal interview livestreams regularly. Don’t miss a beat!

Here's a preview of our most recent YouTube Shorts on Zero Trust! :)


January 2025 Security Breaches

According to the 2024 Annual Data Breach Report by the Identity Theft Resource Center, there were more than 1.7 million victim notices, “a measure of the scale of events and impacts on individuals,” last year, a number that was triple that of 2023. (Read Our Review on ITRC's 2024 Data Breach Report) 

With 3,158 total compromises recorded in 2024, it’s no surprise that this past January 2025 was also full of data breaches.

Here's some of the biggest breaches headlines in January.

PowerSchool data breach endangers the personal information of millions of students | Security Info Watch

The PowerSchool Student Information System (SIS), student information software used by over 16,000 K-12 schools, recently disclosed a major cybersecurity incident that compromised vast amounts of personal data belonging to millions of teachers, students, and graduates across the United States and Canada. On December 28, 2024, threat actors exfiltrated personal information from PowerSchool SIS environments using PowerSource, the software's customer support portal. NBC reports that the breach was achieved with a single compromised employee password. Bleeping Computer's coverage of the incident reports that the number of affected students, as claimed by the hacker, is as high as 62 million.

Change Healthcare data breach victim count rises to 190M | TechTarget 

The Change Healthcare data breach victim count has risen to 190 million, UnitedHealth Group stated. The updated figure is nearly double the breach tally reported to regulators in July 2024. As previously reported, Change Healthcare suffered a cyberattack in February 2024 that led to widespread disruptions across the U.S. healthcare system. BlackCat/ALPHV ransomware actors claimed responsibility for the cyberattack, in which they reportedly exfiltrated six terabytes of data. UnitedHealth Group later confirmed that it paid a $22 million ransom in an effort to recover system access.

Millions of hotel guest reservations leaked in Otelier data breach | TechRadar 

Malicious actors used an infostealer to grab Atlassian login credentials from an Otelier employee. This access was then used to scrape tickets and other data, allowing them to obtain the credentials for S3 buckets, from where the attackers then exfiltrated 7.8TB of data. High-profile hotel chains, including Marriott, Wyndham, and Hilton, have had sensitive customer data. Hundreds of thousands of email addresses were said to have been exposed.


We're hiring, and we're working on our Careers Page!

In the meantime, share your experience with us at jobs@pomerium.com.


Let us know how you’re using Pomerium at media@pomerium.com for free swag! We love hearing about how our users are securing their infrastructure and accelerating their deployments with Pomerium, and we want to share those stories with our community.


Have questions or need assistance? 
Feel free to reach out on our Discuss forums!

Want to see what other people are saying about Pomerium?

Check out ExtraHop's review here, or read our Customer Stories!

Share: Share on Bluesky

Stay Connected

Stay up to date with Pomerium news and announcements.

More Newsletters

See All Newsletters
Newsletter
January 2025 Newsletter
Newsletter
December 2024 Newsletter
Newsletter
October 2024 Newsletter

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.

Pomerium logo
© 2025 Pomerium. All rights reserved