Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Q1 at AlgoSec: What innovations and milestones defined our start to 2026?

As we close out the first quarter of 2026, I find myself reflecting on a start to the year that was defined by product momentum, stronger market validation, growing trust from regulated organizations, and meaningful industry recognition. In just three months, AlgoSec introduced important platform enhancements, published fresh research on where network security is heading, strengthened its standing with government and highly regulated customers, and closed the quarter with three major awards.

How Forward Networks Helps You Respond to CISA Emergency Directive 26-03

CISA issued Emergency Directive 26-03 in response to active exploitation of vulnerabilities in Cisco SD-WAN management systems, specifically Cisco Catalyst SD-WAN Manager and SD-WAN Controller platforms. The vulnerabilities include an authentication bypass flaw (CVE-2026-20127) that allows unauthenticated remote attackers to gain administrative privileges and manipulate network configuration, and a path traversal vulnerability (CVE-2022-20775) that enables local privilege escalation to root.

CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS

On April 4, 2026, Fortinet released a hotfix for a critical vulnerability in FortiClient EMS (CVE-2026-35616) that allows unauthenticated remote threat actors to execute unauthorized code or commands via crafted requests. The flaw stems from improper access control in the API authentication. Fortinet has confirmed observing exploitation of CVE-2026-35616 in the wild. The vulnerability was responsibly disclosed by Defused, which had observed exploitation prior to Fortinet’s official disclosure.

Tuning Machine Learning Settings in Fleet Manager

In this video, we introduce the basic features of Corelight's new Machine Learning and Anomaly Detection tools. We also dive into how you can optimize the machine learning settings to ensure your SOC remains focused on the most critical network threats. Check out this short video to see what these tools can do and to learn how they can help you in implementing your company's NDR plan.

Corelight's Virtual Resident - First Look

Discover Corelight's Virtual Resident tool! This video provides an overview of our new feature that serves as an AI-powered SOC assistant. This platform orchestrates specialized agents to query your SIEM and then return descriptions of threats, network evidence, and suggested next steps while maintaining the highest security standards. We provide a firsthand look at how adaptive playbooks and automated triaging can uncover hidden threats across an entire attack life cycle.

5 Best Whole Home WiFi Systems in Georgia That Beat Extenders on Speed

Slow Wi-Fi lurks on Georgia back porches, spare bedrooms, and basement offices. Cheap range extenders claim to rescue you yet slash speeds in half and saddle you with "_EXT" networks. A mesh kit solves the problem by linking identical nodes under one network name, so your gig-speed plan stays fast from driveway to deck. We put five systems through lab tests and Georgia home trials, rating speed, coverage, security, local support, and three-year cost to find the standouts.

RSAC 2026: Building a Verifiable Foundation for the Agentic Era

Walking the halls of Moscone Center last week, the energy was high, but the conversation had a notably different edge than last year. In 2025, everyone was asking, "What can AI do?" This year, "How can we trust it?" As the theme "The Power of Community" echoed across the keynotes, one thing became clear: a community is only as strong as its foundation. For network and cybersecurity professionals to truly operate as one, we must move beyond fragmented data to a single, trusted source of truth.

Corelight and Microsoft: A smarter way to fight alert fatigue

For SOC teams, the battle against cyber threats can feel like trying to solve a 3D jigsaw puzzle in a bouncy house with missing pieces and a timer blasting every few seconds. Despite the increase in security spending, most teams still struggle with inefficient investigations, alert fatigue, and the non-stop guessing game of prioritizing threats. That’s why we’re excited about our latest integration with Microsoft Security that we hope will help address these persistently common challenges.

How Fidelis Network Delivers Forensic-Level Visibility Across Hybrid Environments

Hybrid environments combine on-premises data centers with public cloud platforms like AWS, Azure, and GCP. This creates complex east-west traffic and north-south flows where advanced cyber threats hide in encrypted tunnels. Fidelis Network addresses this challenge with patented Deep Session Inspection (DSI) technology. DSI captures communication sessions across monitored network segments, recursively decodes nested protocols, data, and extracts network forensic evidence for hybrid networks.