Blog/Tech/News
Technical Resources And Information
- Understanding Threat Vectors in Using Amazon SageMaker AIby Shani Peled (Cybersecurity Blog | SentinelOne) on April 24, 2025 at 1:00 pm
Learn how to avoid potential risks in AWS SageMaker by implementing proper network controls and establishing security guardrails.
- SentinelOne Sets a New Standard | Truly AI-Driven & Unified Cloud Securityby SentinelOne (Cybersecurity Blog | SentinelOne) on April 22, 2025 at 1:00 pm
SentinelOne introduces the next evolution of SentinelOne Singularity™ Cloud Security: a complete CNAPP powered by generative and agentic AI.
- Security Gotchas for AWS Architectsby Teri Radichel (Cybersecurity Blog | SentinelOne) on April 18, 2025 at 12:00 pm
In this guest post, learn what AWS security gotchas to avoid, how to address the risk of faulty logic, and better manage threats as a whole.
- PinnacleOne ExecBrief | Economists on AI & Workplace Productivityby Dakota Cary (Cybersecurity Blog | SentinelOne) on April 15, 2025 at 1:00 pm
In this ExecBrief, we unpack what economists are getting right (and wrong) about AI and workplace productivity in current times.
- Avoiding MCP Mania | How to Secure the Next Frontier of AIby SentinelOne (Cybersecurity Blog | SentinelOne) on April 14, 2025 at 8:54 pm
Learn how to harness the benefits of Model Context Protocol (MCP)-enabled AI systems without introducing risks to your organization.
- The AI Inflection Point | How Agentic & GenAI Are Reshaping Security Operationsby Arijeet Ghatak (Cybersecurity Blog | SentinelOne) on April 11, 2025 at 12:00 pm
Read how security teams are adopting agentic and generative AI to reshape operations and accelerate the journey toward an autonomous SOC.
- Re-Assessing Risk | Subdomain Takeovers As Supply Chain Attacksby Chris Hosking (Cybersecurity Blog | SentinelOne) on April 10, 2025 at 10:45 pm
Learn how a minor DNS misconfiguration can quickly become a major supply chain threat and how to protect your organization from such threats.
- An Official Statement in Response to the April 9, 2025 Executive Orderby SentinelOne (Cybersecurity Blog | SentinelOne) on April 10, 2025 at 4:09 am
Read SentinelOne's response to the Executive Order dated April 9, 2025 here.
- IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINXby SentinelOne (Cybersecurity Blog | SentinelOne) on April 4, 2025 at 6:19 pm
We share actionable mitigation and detection strategies against IngressNightmare so you can protect against possible exploitation in runtime.
- Cyber Threats & SMBs | Chubb & SentinelOne Expedite Access to Cyber Insuranceby Barnaby Page & Craig Giuliano (Cybersecurity Blog | SentinelOne) on April 3, 2025 at 1:00 pm
Today's SMBs face various cyber threats and risks. Learn how our partnership with Chubb helps you qualify and get quotes for cyber insurance.
- Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagersby Lesly Anzo (The Meraki Blog) on March 17, 2025 at 3:00 pm
Physical security breaches are of top concern for CSOs. Protecting your organization requires an approach as proactive and advanced as cybersecurity. But with the latest smart cameras, it doesn’t have to add complexity. The post Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers appeared first on The Meraki Blog.
- Cisco Meraki for Government Achieves FedRAMP® Moderate Authorizationby Lawrence Huang (The Meraki Blog) on February 25, 2025 at 1:12 pm
Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted by 75% of the Fortune 500, our Cisco Meraki for Government solution addresses the unique security and cloud-first needs of government agencies. Sponsored by the Cybersecurity and Read more... The post Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization appeared first on The Meraki Blog.
- Addressing Loss Prevention and Keeping Retail Customers Safeby Lesly Anzo (The Meraki Blog) on December 11, 2024 at 4:00 pm
In a pleasant retail environment, there’s likely a lot going on behind the scenes. Learn how businesses are using next-gen physical security solutions to keep guests and employees safe, protect merchandise, and fend off fraud—even during chaotic peaks of holiday shopping. The post Addressing Loss Prevention and Keeping Retail Customers Safe appeared first on The Meraki Blog.
- AI and IoT: Everything You Need to Know by Cisco Meraki (The Meraki Blog) on September 10, 2024 at 3:00 pm
Artificial intelligence and the Internet of Things are converging to revolutionize connectivity and security. Maximize their potential by taking stock of the benefits and risks that each offer. The post AI and IoT: Everything You Need to Know appeared first on The Meraki Blog.
- It’s Time to Take Control of Experiences and Transform Infrastructure Operations for AIby Jonathan Davidson (The Meraki Blog) on June 4, 2024 at 4:23 pm
Cisco Networking Cloud platform has made phenomenal progress toward continuous intelligence, predictive analytics, and automated remediation over the past 12 months. The post It’s Time to Take Control of Experiences and Transform Infrastructure Operations for AI appeared first on The Meraki Blog.
- Cisco Live 2024: Ensure Digital Resilience, Pervasive Security, and Simpler Operationsby Lawrence Huang (The Meraki Blog) on June 4, 2024 at 3:07 pm
How do you effectively manage experiences if you no longer own all the infrastructure? The answer is at the heart of new operational innovations and infrastructure announced at Cisco Live 2024. They’re all part of the Cisco Networking Cloud platform. The post Cisco Live 2024: Ensure Digital Resilience, Pervasive Security, and Simpler Operations appeared first on The Meraki Blog.
- Simplify 5G Fixed Wireless Access and Scale Secure Connectivity to More Placesby Pratik Desai (The Meraki Blog) on May 29, 2024 at 7:03 am
Cisco introduces its first 5G Standalone (SA) fixed wireless access devices, the Meraki MG52 and MG52E. Powered by the Cisco secure networking platform, these devices help businesses scale robust, always-on, 5G-connected experiences to more people and places — without compromising scale and performance. The post Simplify 5G Fixed Wireless Access and Scale Secure Connectivity to More Places appeared first on The Meraki Blog.
- Systems Manager Scores Nod of Approvalby George Mokdessi (The Meraki Blog) on April 5, 2024 at 3:00 pm
Device management magic from Meraki earns Android Silver Partner status The post Systems Manager Scores Nod of Approval appeared first on The Meraki Blog.
- Do More With Less Using Cloud-Based Securityby Mike Maxsenti (The Meraki Blog) on March 18, 2024 at 3:55 pm
How a single view of security is changing video security and access control The post Do More With Less Using Cloud-Based Security appeared first on The Meraki Blog.
- Is Your Network Infrastructure Ready for More IoT Devices?by Minyi Pan (The Meraki Blog) on February 13, 2024 at 8:00 am
Stay ahead of challenges with new Catalyst 9300-M models The post Is Your Network Infrastructure Ready for More IoT Devices? appeared first on The Meraki Blog.