Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elevating and Evolving the Role of the Channel

Nucleus Manager of Channel Enablement and Training, Tony Ramirez, talks about his recent recognition in CRN's 100 people to know for the channel. During this conversation, he also discusses the evolving role of channel leaders in cybersecurity, the importance of continuous threat exposure management (CTEM) as a process rather than a tool, and the need for contextual understanding in vulnerability management. Tony emphasizes the significance of engaging non-security stakeholders and the opportunities for the channel to educate clients on security posture and vulnerability management.

Attack Surface Discovery: A Quick Overview

Hybrid clouds, rapid development, and Shadow IT have expanded the modern attack surface, making complete visibility both crucial and more difficult than ever. Attack surface discovery offers a means of addressing these visibility gaps by continuously mapping all digital assets — internal, external, and hidden. This guide covers the fundamentals, best practices, and top tools for effectively discovering the attack surface.

Sovereignty in the Age of Digital Interdependence: Rethinking Security for the Modern State

In a world defined by digitization and interconnectivity, the question of sovereignty extends far beyond physical borders. Nations today find themselves grappling with a new reality: how to assert control and protect critical assets when the backbone of their digital existence—cloud infrastructures, distributed systems, and global platforms—operates across jurisdictions, providers, and geopolitical lines.

CISOs turn cyber risk into boardroom business value

Boards now view cybersecurity as a core component of enterprise risk and growth, not just an IT line item. Rising breach costs, regulatory scrutiny, and expanding digital footprints mean directors want to understand how security decisions affect revenue, valuation, and resilience over the long term. For Chief Information Security Officers, that shift creates both pressure and opportunity. The role now includes translating technical risk into clear business impacts, justifying investment with data, and showing how a modern security program protects and even unlocks value across the organization.

Trust Exchange Paid: Scaling Security Communication

Today, Trust Exchange stands tall as a platform used by thousands of customers to communicate their security posture. Now we are introducing the new Trust Exchange Paid tier. This tier is designed to help you eliminate bottlenecks, accelerate deal cycles, and maintain top-tier security communication. For high-growth organizations, scaling communication means that security requests escalate rapidly. With UpGuard’s mission to drive proactive cybersecurity protocols, this is our next step.

Bitsight Threat Intelligence Briefing: Key Malware Trends Shaping Cyber Risk in 2025

The cybercrime underground continues to evolve into a mature, service-based economy that mirrors legitimate technology markets. Threat actors are increasingly adopting professionalized business models, offering malware, access, and data-theft capabilities “as a service” to a broad audience of buyers. During the first half of 2025, Bitsight observed sustained growth in Malware-as-a-Service (MaaS) and Remote Access Trojan (RAT) activity across dark web forums and marketplaces.