Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Future of Agentic AI

Last April, Microsoft Security Copilot taxied down the runway and took flight to help passengers onboard to reach new destinations in cyber defense. BlueVoyant, as a Microsoft Security Copilot pre-launch design advisory council member, was a trusty flight attendant that helped Security Copilot safely take off. Today, as Security Copilot has reached its cruising altitude, Microsoft announced Security Copilot agents that help its passengers to further optimize Microsoft Security tools usage.

Falcon Exposure Management Network Vulnerability Assessment: Demo Drill Down

Traditional network vulnerability scanners leave your critical network assets vulnerable, providing outdated visibility and ineffective prioritization. Falcon Exposure Management's Network Vulnerability Assessment (NVA) delivers real-time visibility, AI-powered prioritization with ExPRT.AI, and seamless integration for automated remediation. This demo showcases how NVA streamlines your security strategy, ensuring precise focus on threats that matter most and proactively protecting your network.

CrowdStrike Falcon Exposure Management Expands Security to Unmanaged Network Assets with Network Vulnerability Assessment

As organizations strengthen endpoint and cloud security, attackers are shifting their focus to often-overlooked network infrastructure like routers, switches, and firewalls. Legacy vulnerability management (VM) solutions struggle to keep pace, relying on slow, periodic scans that fail to provide real-time visibility into emerging threats.

Credit Card Cloning: What Is It , How It Works, and How to Protect Yourself

Discover a charge on your credit card that you don’t recognize. It could be from a card cloning event. Card cloning predominantly affects credit cards, but this phenomenon may also impact some payment platform cards (like those from PayPal or Zelle). In short, card cloning occurs when the card’s magnetic strip or chip is used in unauthorized transactions. Credit card cloning is a form of fraud, but it differs from others in its more nuanced elements.

CVE-2025-29927 - Authorization Bypass Vulnerability in Next.js: All You Need to Know

On March 21st, 2025, the Next.js maintainers announced a new authorization bypass vulnerability – CVE-2025-29927. This vulnerability can be easily exploited to achieve authorization bypass. In some cases – exploitation of the vulnerability can also lead to cache poisoning and denial of service.

WatchGuard Wins CRN 5-Star for 9th Year, Dominating MSP Security

At WatchGuard, we proudly announce that our WatchGuardONE partner program has received the prestigious 5-star rating from CRN, a brand of The Channel Company, in the 2025 CRN Partner Program Guide. This marks the ninth consecutive year WatchGuard has earned this recognition, solidifying the commitment to providing the industry’s most powerful, profitable, and MSP-friendly security solutions.