Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Respond After an Active Directory Compromise: Step-by-Step Active Directory Response and Recovery Playbook

Enterprise IT relies heavily on Active Directory (AD) for user, access, and authentication management. A compromise can harm systems, data, and accounts. Why Swift Response Matters A fast, effective response can contain an AD incident, while delays can turn it into a major organizational crisis, including: A clear AD response plan is essential to systematically: Long downtime, damage to organization’s reputation, and problems with compliance can result from neglecting proactive AD recovery.

Customer Insights with Clark Pichon, Security Operations Center Manager

In this video, Clark Pichon, Security Operations Center Manager, shares how they're leveling up security operations with the help of AI and automation. From building queries faster using Dojo AI to cutting down time-to-detection and closing alerts more efficiently with SIEM automation, see how these tools are helping the team work smarter and respond faster than ever before.

Why Your AI Agents Aren't Enterprise Ready #ai #shorts

Stop building AI agents that CISOs will never approve. If your agents are stuck in the POC (Proof of Concept) stage, it’s likely because they lack a "Passport" and a governance framework. In this clip, Arjun Subedi breaks down why "how well it works" isn't the biggest question in AI anymore—it's "how can I govern it?" Discover how mapping AGENTIC attacks to the MITRE ATT&CK framework through SafeMCP is the missing link to enterprise-level deployment.

Single Sign-On Architecture Deep Dive: Protocols, Tokens & Identity Flow

Given the mountain of applications that we use today, having them together and logging in to each of them can be a hassle. However, a well-designed SSO architecture comes to your rescue increasing productivity and simplifying your daily worklife. This blog aims to unfold the differences in SSO architecture, with a focus on SSO protocols like SAML, OAuth, as well as architecture diagrams, integrations, challenges, and best practices that expert teams are already using.

Acronis earns a place on CRN Security 100 list for the fifth consecutive year

Acronis has earned a spot on CRN’s 2026 Security 100 list in the Identity, Access And Data Security category, marking its fifth consecutive year on the annual ranking. The program highlights channel focused security vendors that help organizations address a rapidly evolving threat landscape across categories such as endpoint and managed security, identity and data security, network security, security operations, and web and application security.

Hybrid Cloud Defense Grid: Bridging Wiz and Runtime Telemetry

The modern cloud security landscape is often fighting a war on two disconnected fronts. On one side, we have Cloud Security Posture Management (CSPM) platforms like Wiz, which act as the cartographers of risk—mapping terrain with high fidelity to identify open ports, unpatched vulnerabilities, and toxic permission combinations. On the other hand, we have Runtime Defense tools (SIEM, EDR, NGFW) that generate massive streams of activity logs.

The Real Risks of Agentic AI in the Enterprise with Camille Stewart-Gloster

In this episode of Data Security Decoded, host Caleb Tolin is joined by Camille Stewart-Gloster, CEO of CAS Strategies and former Deputy National Cyber Director, to unpack how AI is redefining cyber risk at every layer of the organization. Camille explains why identity-based attacks are so effective and how non-human identities (from APIs to AI agents) are quietly expanding the attack surface. She emphasized how critical MFA is for organizations to enable as they scale up AI operations, and why conditional access and governance must be foundational, not optional.

OpenClaw as a Security Threat - The 443 Podcast - Episode 358

This week on the podcast, we discuss OpenClaw, the open source chatbot that has exploded in popularity since launching late last year, and some of the risk it introduces to organizations. Before that, we chat about Ring's Super Bowl advertisement that caused a stir before ending with a Google Threat Intelligence Group report on advanced threat actor AI usage.