Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Future of Enterprise AI Agents Demands Trust: Zenity Included in Forrester's "The AI Governance Solutions Landscape, Q2 2025"

As enterprises rapidly adopt AI Agents to enhance operations, the imperative for robust governance and security has never been clearer. We are pleased to announce Zenity's inclusion in Forrester's "The AI Governance Solutions Landscape, Q2 2025," recognizing leading vendors that assist enterprises in securing and governing their AI initiatives.

Doing More with Less: Achieving IT Cost Optimization with 11:11 Systems

So, I was driving to gym the other day, listening to the radio. Pause. I know what you’re thinking. Okay, boomer. Yes, believe it or not, cars still have radios and some people—mostly boomers or those of us with boomer-like tendencies—still listen to them. And if you’ve listened to the radio recently, you’ll quickly pick up on a pattern. Not only do you hear the same songs, but you also hear the same commercials … over and over again.

Don't fall for it: Five authentication assumptions that can put your company at risk

Myths have always floated through the cybersecurity sphere, and if you don’t address them, they can invite risk to your organization. Join solution engineers Solenne Le Guernic and Grant Tackett to dispel common authentication assumptions that act as landing lights to cybercriminals. Explore the ways OneLogin can mitigate risk, promote productivity and ensure secure, flexible security for all users – no matter the device, the user or the value of the accessed asset.

Revoking Security Clearances as Punishment - The 443 Podcast - Episode 326

This week on the podcast, we discuss a recent White House executive order that revoked the security clearances of former CISA chief Christopher Krebs as well as all other employees at SentinelOne and the implications that brings to our industry. Before that, we give a quick update on the Oracle Cloud breach from a few weeks back that Oracle has finally confirmed. We end with our thoughts on a few Microsoft Windows AI features that just launched in early preview and how they might impact data privacy and security.

Creating Custom Dashboards in UTMStack

In this video, I walk you through the process of creating custom dashboards and visualizations in UTMStack SIEM. I demonstrate how to build various types of visualizations, such as pie charts and bar charts, to effectively display alert data. I also highlight the importance of adding filters for better data management and how to set up auto-refresh for real-time monitoring. Please make sure to follow along and try creating your own dashboards as we go through the steps together!

Managing False Positives and Alert Fatigue in SIEM

In this video, I walk you through the process of managing false positives in the UTMSatck platform. We often encounter numerous false positives when starting with a new SIEM, which can lead to confusion and unnecessary alerts. I demonstrate how to tag these false positives effectively and filter them out to streamline our alert system. Please make sure to implement the tagging rules I discussed to help reduce noise in your SOC team's workflow.

CMMC Compliance Automation in the SIEM

In this video, I walk you through the essentials of UTMStack compliance automation, specifically focusing on CMMC compliance. I explain how to navigate the compliance menu and ensure the correct framework is selected. I also highlight the automatic evaluation of controls and the options available for exporting reports. Please make sure to review the controls and provide any necessary evidence if the system indicates non-compliance.