Blog

Transforming the Cybersecurity Insurance Market with SentinelOne’s New Risk Assurance Initiative

Last week’s global IT outage made one thing clear: technology risk equals business risk. Insurers understand this, and SentinelOne is partnering with many of the industry’s top carriers and providers, including Aon, Chubb, AXA XL, Coalition, CFC, AtBay, Beazley, Hanover, Travelers, Corvus, and Crum & Forster to help organizations mitigate it. As cyber threats become […]

Transforming the Cybersecurity Insurance Market with SentinelOne’s New Risk Assurance Initiative Read More »

CrowdStrike Global Outage – Threat Actor Activity and Risk Mitigation Strategies

Executive Summary On July 19th, 2024, Windows 7 and above systems running CrowdStrike’s Falcon sensor were served a faulty channel file that caused kernel instability and would result in a Blue Screen of Death (BSOD) loop and the largest global IT outage in history. The culprit is Channel File 291 (named with a pattern ‘C-00000291-*.sys’)

CrowdStrike Global Outage – Threat Actor Activity and Risk Mitigation Strategies Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 29

The Good | Interpol-Led Operation Cracks Down on West African Cybercrime Syndicates The axe has fallen hard on West African crime syndicates as part of Operation Jackal III, a months-long law enforcement effort run across 21 countries. This week, Interpol reported some 300 arrests, the identification of over 400 suspects, 720 blocked bank accounts, and

The Good, the Bad and the Ugly in Cybersecurity – Week 29 Read More »

Managed Detection and Response (MDR) Beyond the Endpoint

Endpoint Detection and Response (EDR) has been the foundational technology of effective detection and response programs for many years, providing security teams with unparalleled visibility and response capabilities across end user systems, cloud workloads, and servers. While this remains true today, security operation centers (SOC) and incident response (IR) teams need additional capabilities ‘beyond the

Managed Detection and Response (MDR) Beyond the Endpoint Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 28

The Good | Feds Dismantle Major GenAI-Based Bot Farm Spreading Pro-Russian DisInformation Campaigns In a joint international operation led by the FBI, law enforcement have seized two domain names and nearly a thousand social media accounts all controlled by a large bot farm dedicated to spreading Russian propaganda. Under the management of a Russian FSB

The Good, the Bad and the Ugly in Cybersecurity – Week 28 Read More »

The Impact of AI in Accelerating Autonomous Security Operations

Autonomous vehicles have captured the imagination of humans for decades. There are few examples of fully autonomous vehicles available today, designed for limited commercial use, but there is international consensus on what fully autonomous vehicles are and the standards by which they are measured. Autonomous flight is also quickly becoming one of the most popular,

The Impact of AI in Accelerating Autonomous Security Operations Read More »

Singularity Operations Center | Unified Security Operations for Rapid Triage

SentinelOne recently launched Singularity Operations Center, the new unified console, to centralize workflows and accelerate detection, triage, and investigation for an efficient and seamless analyst experience. This pivotal update includes integrated navigation to improve workflows and new and enhanced capabilities such as unified alerts management. Providing a deeper look into the Operations Center, this blog

Singularity Operations Center | Unified Security Operations for Rapid Triage Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 27

The Good | International Joint Operation Takes Down Over 600 IP Addresses Abusing Cobalt Strike Tool Hundreds of IP addresses abusing Cobalt Strike have been shut down in a joint effort involving law enforcement across several nations. Codenamed “Morpheus”, the joint operation resulted in flagging 690 IP addresses and domains used to infiltrate victim networks.

The Good, the Bad and the Ugly in Cybersecurity – Week 27 Read More »

AI-Driven Real-Time Malware and Ransomware Detection for NetApp

Network-attached storage devices like NetApp contain volumes of data which are vital to business operations. With broad access available to so many users, protecting NetApp storage from malware is critical to operational stability and integrity. Organizations worldwide face increasingly sophisticated threat actors. AI-powered threat detection can level the playing field, protect business data, and stop

AI-Driven Real-Time Malware and Ransomware Detection for NetApp Read More »