Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netskope's 20/20 Vision and Recognition as a SASE Leader

Netskope has been named a Leader in the 2025 Gartner Magic QuadrantTM for SASE Platforms. This is the second successive year, and we are now positioned furthest in vision in the Gartner Magic QuadrantTM reports for BOTH SASE Platforms and SSE. That’s what we, at Netskope, call “20/20 Vision.” In this year’s 2025 Critical Capabilities for SASE Platforms report, Gartner defined four key Use Cases.

Why aren't you using MFA yet?

Microsoft highly recommends enabling MFA on all Entra ID users to protect their environment against potential attackers and avoid getting breached. This can cause a lot of issues and damage for the company from reputation problems to large fines. The latest figures from Microsoft Threat Intelligence research show that more than 99% of attacks are password attacks. Microsoft alone registers 7,000 password attacks per second!

CrowdStrike Named a Leader in the 2025 GigaOm SIEM Radar Report

CrowdStrike is proud to be named a Leader and Fast Mover in the 2025 GigaOm Radar for Security Information and Event Management (SIEM). This recognition positions CrowdStrike Falcon Next-Gen SIEM as the core of the AI-native SOC and future of security operations. CrowdStrike earned perfect 5/5 scores in key areas including Attack Surface Coverage, LLM-Based Co-Pilot and Agents, Automation, and Threat Research Units.

PIT Crew - Kinetic Solutions - Tanium Tech Talks #133

Tanium's PIT Crew program, "Partner Innovators of Tanium", is an exclusive global community of talented technologists and visionaries who share our passion for driving customer success, protecting critical IT infrastructure from bad actors, and helping shape the evolution of Autonomous Endpoint Management (AEM). Today meet Ethan from Kinetic Solutions: Global Tanium services based out of Wisconsin USA.

Transform Security Investigations in Seconds #teleport #securecloud #identity #blueteam

Discover how AI is revolutionizing security operations by automatically analyzing millions of log lines to provide instant user activity summaries. Learn how this game-changing tool can summarize 24-48 hours of user data including critical actions, IP addresses, locations, and working patterns - eliminating the need for manual log investigation. Perfect for security teams looking to streamline their workflow and improve threat detection efficiency.

MTTD vs. MTTR: Definition, Differences, & Why They Matter

When a cyberattack occurs, every second counts. Metrics like Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) are critical benchmarks in cybersecurity, helping organizations evaluate the effectiveness of their Security Operations Centers (SOCs). But what’s the difference between MTTD vs MTTR, and why do they matter?

Critical Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC

On June 25, 2025, Cisco disclosed two critical vulnerabilities affecting Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). Tracked as CVE-2025-20281 and CVE-2025-20282, these flaws enable unauthenticated remote attackers to execute arbitrary commands as the root user via exposed HTTPS APIs. CVE-2025-20281 arises from insufficient validation of user-supplied input in a public API, allowing crafted requests to trigger remote code execution.

What's Really Putting SMBs at Risk? These 8 Cybersecurity Myths

If you’ve done everything you can think of to stay protected — patched systems, trained employees, upgraded tools — but the number of threats still keep increasing, you’re not alone. You’re not behind. You’re not unprepared. But you may be operating on outdated assumptions. For small and midsize businesses, the real danger isn’t just what attackers are doing—it’s the cybersecurity myths you’ve been told to believe. The ones that seem logical.