In November 2025, a major public-private sector collaboration took down three significant malware networks. Operation Endgame involved law enforcement agencies from six EU countries, Australia, Canada, the U.K., and the U.S., along with Europol and 30 private sector partners, including CrowdStrike. The dismantled infrastructure consisted of hundreds of thousands of infected computers containing several million stolen credentials.
In Episode 4 of Corelight Defenders, I sit down with Angela Loomis, Corelight's Director of Technical Account Management, to explore her remarkable 25-year journey in cybersecurity. Angela shares her unconventional entry into the field, starting from a background in television production to becoming a leader in security strategy. We delve into the importance of curiosity in cybersecurity, discussing how diverse experiences enrich the profession, and whether formal education might dampen that curiosity.
As organizations increasingly shift workloads, data, and applications to the cloud, the security landscape becomes more complicated. You’re no longer just managing a single environment, you’re managing dozens of services, containers, and APIs that are all interrelated and deployed across multiple clouds.
In 2026, one theme will become impossible for security and infrastructure leaders to ignore. The architecture that once secured the enterprise no longer aligns with how the enterprise actually works. Users are everywhere. Applications are everywhere. Data is everywhere. Threats are everywhere. What is not everywhere is consistency.
IT and security teams are stuck between two bad options: over-automate on noisy, incomplete data and risk eroding trust, or avoid automation and drown in manual triage. With surging data volumes and increasingly complex stacks, both choices drive alert fatigue, longer MTTD/MTTR, and analyst burnout. Tines and Cribl offer an alternative vision.
Data exfiltration is no longer limited to elite external hackers — it’s a common occurrence in everyday business operations. Employees share files externally, upload documents to personal cloud accounts, copy source code to USB drives, or paste sensitive text into browser-based AI tools. Most of the time, these actions are unintentional.
In the public sector, IT efficiency isn't just about convenience - it’s about fiscal responsibility and strict compliance. Government agencies often manage thousands of users across Jira, Confluence, and Jira Service Management (JSM). As these environments grow, so does the complexity of managing access.
Managing external customer access in Jira Service Management (JSM) often seems straightforward, but it can create recurring problems for many teams: large volumes of spam tickets. When the customer portal allows anonymous submissions, bots and unsolicited traffic can freely enter the system, slowing support operations, affecting the customer experience, and introducing unnecessary security exposure. Teams usually see the same symptoms.
Invisible or hidden risks often corrupt organizations inside out. These are hard to detect and go unnoticed for a prolonged period. Privilege Creep, one such hidden risk, is a silent security gap, where there is an accumulation of inessential access rights of employees over a period of time. This could pave the way for unauthorized access and breaches.