- The Good, the Bad and the Ugly in Cybersecurity – Week 11by SentinelOne (Cybersecurity Blog | SentinelOne) on March 13, 2026 at 1:00 pm
Ransomware negotiator charged with aiding BlackCat, actors exploit FortiGate firewalls to breach networks, and Iran hacktivists wipe Stryker systems.
- FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromiseby Alex Delamotte, Stephen Bromfield, Mary Braden Murphy & Amey Patne (Cybersecurity Blog | SentinelOne) on March 10, 2026 at 1:00 pm
FortiGate SSO flaws allows attackers to steal configs, abuse AD creds, deploy RMM tools, and exfiltrate NTDS files.
- SentinelOne Intelligence Brief: Iranian Cyber Activity Outlookby SentinelOne (Cybersecurity Blog | SentinelOne) on February 28, 2026 at 8:00 pm
Iran-linked cyber activity may surge after strikes, targeting US and Israeli sectors; SentinelOne provides intel and urges vigilance.
- From Access to Execution: Securing Identity in the Age of Autonomous Agentsby Arijeet Ghatak (Cybersecurity Blog | SentinelOne) on February 25, 2026 at 2:00 pm
SentinelOne secures human and non-human identities with continuous behavioral validation across AI, browsers, and endpoints.
- OneClaw: Discovery and Observability for the Agentic Eraby SentinelOne (Cybersecurity Blog | SentinelOne) on February 18, 2026 at 4:04 pm
Prompt Security from SentinelOne turns hidden agent activity into clear, actionable governance intelligence with the release of OneClaw.
- Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Usersby SentinelOne (Cybersecurity Blog | SentinelOne) on February 17, 2026 at 9:28 pm
SentinelOne secures AI from infrastructure to agents, delivering visibility, governance, and control at scale.
- ClawSec: Hardening OpenClaw Agents from the Inside Outby SentinelOne (Cybersecurity Blog | SentinelOne) on February 9, 2026 at 2:52 pm
Learn about how ClawSec, by Prompt Security, secures OpenClaw agents, stopping malicious skills with zero-trust defenses.
- AI Security, From Data to Runtime: A Holistic Defense Approachby SentinelOne (Cybersecurity Blog | SentinelOne) on February 6, 2026 at 1:30 pm
SentinelOne secures AI end-to-end, protecting data, infrastructure, and runtime with Data Security Posture Management (DSPM) capabilities.
- 12 Months of Fighting Cybercrime & Defending Enterprises | The SentinelLABS 2025 Reviewby SentinelLABS (Cybersecurity Blog | SentinelOne) on January 6, 2026 at 4:00 pm
From ransomware repurposed for espionage to increased exploitation of cloud platforms, learn about the key trends from SentinelLABS research in 2025.
- When Your AI Coding Plugin Starts Picking Your Dependencies: Marketplace Skills and Dependency Hijack in Claude Codeby SentinelOne (Cybersecurity Blog | SentinelOne) on January 6, 2026 at 2:00 pm
Learn how AI coding assistants managing dependencies via plugins are now creating a new supply-chain risk when automation is compromised.
- Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagersby Lesly Anzo (The Meraki Blog) on March 17, 2025 at 3:00 pm
Physical security breaches are of top concern for CSOs. Protecting your organization requires an approach as proactive and advanced as cybersecurity. But with the latest smart cameras, it doesn’t have to add complexity. The post Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers appeared first on The Meraki Blog.
- Cisco Meraki for Government Achieves FedRAMP® Moderate Authorizationby Lawrence Huang (The Meraki Blog) on February 25, 2025 at 1:12 pm
Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted by 75% of the Fortune 500, our Cisco Meraki for Government solution addresses the unique security and cloud-first needs of government agencies. Sponsored by the Cybersecurity and Read more... The post Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization appeared first on The Meraki Blog.
- Addressing Loss Prevention and Keeping Retail Customers Safeby Lesly Anzo (The Meraki Blog) on December 11, 2024 at 4:00 pm
In a pleasant retail environment, there’s likely a lot going on behind the scenes. Learn how businesses are using next-gen physical security solutions to keep guests and employees safe, protect merchandise, and fend off fraud—even during chaotic peaks of holiday shopping. The post Addressing Loss Prevention and Keeping Retail Customers Safe appeared first on The Meraki Blog.
- AI and IoT: Everything You Need to Know by Cisco Meraki (The Meraki Blog) on September 10, 2024 at 3:00 pm
Artificial intelligence and the Internet of Things are converging to revolutionize connectivity and security. Maximize their potential by taking stock of the benefits and risks that each offer. The post AI and IoT: Everything You Need to Know appeared first on The Meraki Blog.
- It’s Time to Take Control of Experiences and Transform Infrastructure Operations for AIby Jonathan Davidson (The Meraki Blog) on June 4, 2024 at 4:23 pm
Cisco Networking Cloud platform has made phenomenal progress toward continuous intelligence, predictive analytics, and automated remediation over the past 12 months. The post It’s Time to Take Control of Experiences and Transform Infrastructure Operations for AI appeared first on The Meraki Blog.
- Cisco Live 2024: Ensure Digital Resilience, Pervasive Security, and Simpler Operationsby Lawrence Huang (The Meraki Blog) on June 4, 2024 at 3:07 pm
How do you effectively manage experiences if you no longer own all the infrastructure? The answer is at the heart of new operational innovations and infrastructure announced at Cisco Live 2024. They’re all part of the Cisco Networking Cloud platform. The post Cisco Live 2024: Ensure Digital Resilience, Pervasive Security, and Simpler Operations appeared first on The Meraki Blog.
- Simplify 5G Fixed Wireless Access and Scale Secure Connectivity to More Placesby Pratik Desai (The Meraki Blog) on May 29, 2024 at 7:03 am
Cisco introduces its first 5G Standalone (SA) fixed wireless access devices, the Meraki MG52 and MG52E. Powered by the Cisco secure networking platform, these devices help businesses scale robust, always-on, 5G-connected experiences to more people and places — without compromising scale and performance. The post Simplify 5G Fixed Wireless Access and Scale Secure Connectivity to More Places appeared first on The Meraki Blog.
- Systems Manager Scores Nod of Approvalby George Mokdessi (The Meraki Blog) on April 5, 2024 at 3:00 pm
Device management magic from Meraki earns Android Silver Partner status The post Systems Manager Scores Nod of Approval appeared first on The Meraki Blog.
- Do More With Less Using Cloud-Based Securityby Mike Maxsenti (The Meraki Blog) on March 18, 2024 at 3:55 pm
How a single view of security is changing video security and access control The post Do More With Less Using Cloud-Based Security appeared first on The Meraki Blog.
- Is Your Network Infrastructure Ready for More IoT Devices?by Minyi Pan (The Meraki Blog) on February 13, 2024 at 8:00 am
Stay ahead of challenges with new Catalyst 9300-M models The post Is Your Network Infrastructure Ready for More IoT Devices? appeared first on The Meraki Blog.











