Blog

PinnacleOne ExecBrief | China’s “New Quality Productive Forces”

Last week, PinnacleOne examined how China’s strategy for evading semiconductor technology controls is driving an increased insider threat issue for leading western enterprises. This week, we highlight how a new turn of phrase by China’s leader will spark efforts across the country to make scientific breakthroughs occur out of thin air (or steal them from […]

PinnacleOne ExecBrief | China’s “New Quality Productive Forces” Read More »

AWS Integrations | Enhancing Visibility & Powering Threat Hunting

As organizations go beyond simply migrating to the cloud and use cloud services strategically to accelerate their business outcomes, securing the cloud footprint has become a key element of this strategy. It’s also becoming increasingly complex with most organizations using multiple clouds, Saas-based tools, and security solutions within their stack to protect them. Gaining consistent

AWS Integrations | Enhancing Visibility & Powering Threat Hunting Read More »

PinnacleOne ExecBrief | Chips and Spies – Insider Threats as China Seeks to Evade Controls

Last week, PinnacleOne examined the digital “great game” in the Middle East, as the convergence of AI, nuclear energy, and geopolitical competition. This week, we highlight how China’s strategy for evading semiconductor technology controls is driving an increased insider threat issue for leading western enterprises. Please subscribe to read future issues — and forward this

PinnacleOne ExecBrief | Chips and Spies – Insider Threats as China Seeks to Evade Controls Read More »

Chained Detections | Revolutionizing Adaptive Threat Hunting

Chained detections is a new threat hunting paradigm aligned with the strategy of chaining interesting events to identify behavior patterns and augment threat attribution. Much like SentinelOne’s Storyline technology, which connects events from various sources to create a narrative of an attack, human threat hunters harness these capabilities to comprehensively grasp the potential impact of

Chained Detections | Revolutionizing Adaptive Threat Hunting Read More »

Partnering for Success | A Q&A with Brian Lanigan, SVP of Partner Ecosystem, SentinelOne

As a partner-driven organization, SentinelOne recognizes the critical role that partners play in securing our digital world. Partners are instrumental in helping customers understand how to break through the noise and recommending the best solutions to help solve their toughest security challenges, and businesses are increasingly turning to managed security to elevate protection, address cybersecurity

Partnering for Success | A Q&A with Brian Lanigan, SVP of Partner Ecosystem, SentinelOne Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 20

The Good | International Law Enforcement Charge Crypto Criminals & Take Down a New Iteration of BreachForums In the past week, law enforcement agencies took down cryptocurrency thieves responsible for a multi-million dollar theft from the Ethereum blockchain, and seized a second iteration of the notorious hacking platform, BreachForums. The DoJ has unsealed an indictment

The Good, the Bad and the Ugly in Cybersecurity – Week 20 Read More »

Unify the Analyst Experience with Singularity Operations Center

On April 26, 2024, SentinelOne marked a significant milestone in security management with the launch of the Singularity Operations Center, the new unified security console. This major update to the Singularity Platform is now generally available (GA) to all cloud-native customers, representing a pivotal shift to a more integrated and efficient analyst experience for security

Unify the Analyst Experience with Singularity Operations Center Read More »

Cloud Native Security | Prioritize Better, Respond Faster, with Verified Exploit Paths™

This week, SentinelOne launched Singularity Cloud Native Security (CNS), our agentless Cloud Native Application Protection Platform (CNAPP) uniquely designed to assess cloud environments through the eyes of a threat actor. As attackers increasingly target cloud environments, SentinelOne’s latest solution helps organizations better defend against these attacks. CNS simulates attack methods to verify exploit pathways, so-called

Cloud Native Security | Prioritize Better, Respond Faster, with Verified Exploit Paths™ Read More »

macOS Cuckoo Stealer | Ensuring Detection and Defense as New Samples Rapidly Emerge

Infostealers targeting macOS devices have been on the rise for well over a year now, with variants such as Atomic Stealer (Amos), RealStealer (Realst), MetaStealer and others widely distributed in the wild through malicious websites, cracked applications and trojan installers. These past few weeks have seen a new macOS malware family appear that researchers have

macOS Cuckoo Stealer | Ensuring Detection and Defense as New Samples Rapidly Emerge Read More »