Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Corelight's Vincent Stoffer on Why Enterprises Can't Rely Only on Endpoint Security

The cybersecurity industry's heavy reliance on endpoint detection and response tools has created significant vulnerabilities, particularly around IoT devices and operational technology that cannot be monitored using traditional security tools, according to Vincent Stoffer, field CTO at Corelight. This growing attack surface, combined with sophisticated threat actors who exploit any available entry point, has pushed organizations to reevaluate their security strategies and consider more comprehensive network monitoring approaches.

Introducing Always-Accurate Endpoint Collection with Forward Enterprise

For most enterprises, endpoint visibility remains one of the most elusive elements of network security. Devices connect, disconnect, or move constantly, making it nearly impossible to keep an accurate inventory with traditional tools. Without a clear picture of all endpoints—laptops, printers, IoT devices, and more—security and compliance teams are often flying blind. That changes with Forward Networks’ new endpoint collection feature.

Automated Baseline Enforcement with Falcon for IT

CrowdStrike Falcon for IT automates baseline enforcement and remediation to eliminate the security gaps adversaries exploit. As devices drift from their original secure state—through unauthorized software, missing updates, or policy deviations—Falcon for IT uses real-time telemetry and Dynamic Targeting to surface misconfigurations and highlight non-compliant endpoints. With tools like Charlotte AI, osquery, and native scripting, teams gain instant visibility into deviations, apply targeted remediation at scale, and enforce standards without disrupting end users.

WatchGuard Signs The Climate Pledge, Commits to Net Zero by 2040

As a cybersecurity company, we spend every day thinking about how to protect the world from threats. As a global organization, WatchGuard has the power ‒ and the responsibility ‒ to step up and help fight the threat of unchecked climate change. That’s why we have signed The Climate Pledge and are deepening our commitment to environmental sustainability.

The CVE Near-Death Experience - The 443 Podcast - Episode 327

This week on the podcast, we discuss how the CVE program was granted an 11th hour temporary reprieve after the program's steward, MITRE, originally announced their contract had not been renewed. After that, we cover the recent cyberattack against 4chan that took it offline and resulted in leaked moderator information and source code. We end with a quick discussion on a post-exploitation technique being used in the wild against Fortinet FortiGate devices.

#208 - Cybersecurity in space with Blake Hershey and Gabe Garrett from MORI Associates

On today’s episode of The Cybersecurity Defenders Podcast we are going to be speaking with a couple of team members from MORI Associates, a leading firm with over 25 years of experience in delivering comprehensive solutions across technology, communication, and space mission support. Specializing in scalable, high-impact technologies, the company addresses current challenges while anticipating future needs, contributing to a more connected, efficient, and secure future.

How to Grow a Strong Cybersecurity Culture

Let’s be honest — when most people hear “cybersecurity training,” their eyes glaze over faster than a workstation running Windows 98. But here’s the kicker: 74% of data breaches still involve a human element, whether through social engineering, errors, or misuse, according to Verizon’s 2023 DBIR. That’s not just a stat — it’s a blinking neon sign pointing to the importance of cybersecurity culture.