Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bridging Innovation and Policy: Zenity's Strategic Discussions in Washington DC

I recently had the fantastic opportunity to represent Zenity in a round of strategic discussions with legislative and policy leaders in Washington DC as a part of the OpenPolicy Coalition. Zenity has recently partnered with OpenPolicy and joined the ecosystem in the effort to bridge the gap between bleeding edge innovation and traditional policy.

How metadata wrestled control of FINRA's colossal data archiving requirements

The financial industry is known for its rigorous and sometimes quirky data retention requirements that can challenge even the most seasoned security expert. For example, FINRA Rule 4511 requires members to "preserve for a period of at least six years those FINRA books and records for which there is no specified period under the FINRA rules or applicable Exchange Act rules." Keeping six years of records: That's no small feat. But it's certainly doable.

Quick FIX log management: How metadata simplifies financial protocol tracking (and how Corelight's platform can help)

Financial institutions, such as banks and trading houses, have a strong interest in recording key transaction activity within their networks. In the face of daunting data storage requirements, many are finding that Corelight’s network metadata—notably metadata produced by Zeek—is the key to a simplified tracking and storage process. Many of our customers used to rely on packet capture (PCAP).

How to Defend Against Pass-the-Ticket Attacks: Stop PC Hacking Techniques in Active Directory

Discover how cybercriminals exploit the Pass-the-Ticket attack to breach critical systems—and learn how to defend against it! In this cybersecurity tutorial, Jon Obst, Director of R&D at Netwrix Corporation, demonstrates this advanced Active Directory hacking technique. See how attackers use PC hacking techniques to steal user tickets without passwords, enabling lateral movement, privilege escalation, and data theft.

Fortifying Financial Services Cybersecurity with Threat Intelligence and Cybersecurity Automation

The World Economic Forum’s Global Cybersecurity Outlook 2025 Insight Report paints a bleak picture of what the year ahead holds for technology security teams worldwide. However, some industries are likely to be worse off than others.

How AI is Transforming Cyber Attacks

Since its introduction into cybersecurity in the late 1980s as a tool for detecting unusual activity, artificial intelligence (AI) has grown in popularity and functionality, with a major surge of adoption happening in the past few years, thanks to its growing ability to perform tasks faster and more accurately than humans. However, AI has never operated in isolation; it has always relied on human input. And any advanced technology that requires human input can be used for both good and bad.

Just-In-Time (JIT) Access Management: The Essential Guide

Standing privileges are a ticking time bomb in your cloud environment—and the threat might be closer than you think. Every user with continuous access represents a potential vulnerability, and the financial, reputational, and legal reputations can be severe. Stolen credentials were among the top three reasons hackers gain access to organizations’ systems.