New this week on the, Corey Nachreiner and Marc Laliberte unpack the recent White House executive order that revoked security clearances for former CISA chief Christopher Krebs.
In this eye-opening Defender Fridays session, industrial cybersecurity expert Lesley Carhart explains how OT incident response differs fundamentally from traditional IT security, where the stakes involve potential loss of human life, environmental damage, and critical infrastructure failure.
LimaCharlie's SecOps Cloud Platform (SCP) creates a scalable, versatile, and actionable observability pipeline by collecting and standardizing telemetry from the full security stack. Stream data from any input, route it to any output. The SCP provides visibility into telemetry sources and empowers users to create automated responses to actionable events in the pipeline.
Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we will explore ways to increase endpoint security in your organization.
Malware hasn’t just increased—it’s become harder to detect. Evasive techniques are reshaping the threat landscape and pushing traditional security models to their limits. Today’s advanced malware campaigns are consistently slipping past multiple layers of defense—from email and network to endpoints—challenging even the most robust infrastructures.
All-in-One Security: See how simple it is to keep your business secure. Our demo shows you how we protect your network, endpoints, identity, and Wi-Fi, all from one place.
This week on the podcast, we discuss a recent White House executive order that revoked the security clearances of former CISA chief Christopher Krebs as well as all other employees at SentinelOne and the implications that brings to our industry. Before that, we give a quick update on the Oracle Cloud breach from a few weeks back that Oracle has finally confirmed. We end with our thoughts on a few Microsoft Windows AI features that just launched in early preview and how they might impact data privacy and security.
Building strong cybersecurity doesn’t require fancy tools or a Hollywood-style war room. Often, it just takes the basics ‒ done really well. Think of it like gardening: healthy habits, applied consistently, create deep roots that protect your business when storms roll in. Here are five essential practices that every organization ‒ from small MSPs to midsize enterprises ‒ should plant today to ensure a secure tomorrow.
Nowadays, cybersecurity is more than just a technical issue; it has become a strategic element for companies. However, finding the right balance between protecting data and leveraging it to achieve business goals remains a significant challenge.