Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Major VMware Partnership Announcement and How 11:11 Systems Keeps You Moving Forward

Broadcom’s recent announcement to retire the VMware Advantage Partner program has left many organizations questioning their virtualization strategy. As the dust settles on this major industry shift, understanding what these changes mean for your organization and how to navigate them quickly is all important. The transition affects thousands of VMware partners worldwide, but for customers and partners alike, one thing remains clear: the need for reliable, experienced partners has never been greater.

Recovering Entra ID with Veeam

In my previous post, we explored the reasons and methods for safeguarding Microsoft Entra ID data using Veeam Backup & Replication. While having secure, encrypted backups is essential, their value diminishes if you can’t restore them when it matters most. In this post, we’ll dive into the recovery process step by step. If you’ll remember there are a number of object types within Entra ID that can be protected at this time and they are.

Netskope's 20/20 Vision and Recognition as a SASE Leader

Netskope has been named a Leader in the 2025 Gartner Magic QuadrantTM for SASE Platforms. This is the second successive year, and we are now positioned furthest in vision in the Gartner Magic QuadrantTM reports for BOTH SASE Platforms and SSE. That’s what we, at Netskope, call “20/20 Vision.” In this year’s 2025 Critical Capabilities for SASE Platforms report, Gartner defined four key Use Cases.

Why aren't you using MFA yet?

Microsoft highly recommends enabling MFA on all Entra ID users to protect their environment against potential attackers and avoid getting breached. This can cause a lot of issues and damage for the company from reputation problems to large fines. The latest figures from Microsoft Threat Intelligence research show that more than 99% of attacks are password attacks. Microsoft alone registers 7,000 password attacks per second!

CrowdStrike Named a Leader in the 2025 GigaOm SIEM Radar Report

CrowdStrike is proud to be named a Leader and Fast Mover in the 2025 GigaOm Radar for Security Information and Event Management (SIEM). This recognition positions CrowdStrike Falcon Next-Gen SIEM as the core of the AI-native SOC and future of security operations. CrowdStrike earned perfect 5/5 scores in key areas including Attack Surface Coverage, LLM-Based Co-Pilot and Agents, Automation, and Threat Research Units.

PIT Crew - Kinetic Solutions - Tanium Tech Talks #133

Tanium's PIT Crew program, "Partner Innovators of Tanium", is an exclusive global community of talented technologists and visionaries who share our passion for driving customer success, protecting critical IT infrastructure from bad actors, and helping shape the evolution of Autonomous Endpoint Management (AEM). Today meet Ethan from Kinetic Solutions: Global Tanium services based out of Wisconsin USA.

Transform Security Investigations in Seconds #teleport #securecloud #identity #blueteam

Discover how AI is revolutionizing security operations by automatically analyzing millions of log lines to provide instant user activity summaries. Learn how this game-changing tool can summarize 24-48 hours of user data including critical actions, IP addresses, locations, and working patterns - eliminating the need for manual log investigation. Perfect for security teams looking to streamline their workflow and improve threat detection efficiency.

MTTD vs. MTTR: Definition, Differences, & Why They Matter

When a cyberattack occurs, every second counts. Metrics like Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) are critical benchmarks in cybersecurity, helping organizations evaluate the effectiveness of their Security Operations Centers (SOCs). But what’s the difference between MTTD vs MTTR, and why do they matter?

Critical Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC

On June 25, 2025, Cisco disclosed two critical vulnerabilities affecting Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). Tracked as CVE-2025-20281 and CVE-2025-20282, these flaws enable unauthenticated remote attackers to execute arbitrary commands as the root user via exposed HTTPS APIs. CVE-2025-20281 arises from insufficient validation of user-supplied input in a public API, allowing crafted requests to trigger remote code execution.