Blog

PinnacleOne ExecBrief | Enterprise Risk Management in China

Last week, PinnacleOne flagged the ongoing SVR exploitation of their breach of Microsoft. This week, we examine the geopolitical dynamics and risks facing firms that do business or have key dependencies in China and highlight principles to frame a China-for-China strategy given firm-specific threat models. Please subscribe to read future issues — and forward this […]

PinnacleOne ExecBrief | Enterprise Risk Management in China Read More »

Experiencing a Data Breach? 8 Steps for Effective Incident Response

Experiencing a breach? Call us immediately at 1-855-868-3733. If you would like to discuss your organization’s security posture, contact us here and our team will be in touch shortly. Data breaches have been all over the news lately. Understanding how to prevent them—and what to do when they happen—is essential to every organization’s operational success.

Experiencing a Data Breach? 8 Steps for Effective Incident Response Read More »

S Ventures Invests in Auguria to Solve SecOps Overload

We are excited to announce S Ventures investment in Auguria to empower the vision of achieving 90%+ efficiency in SOC investigations and reducing SIEM costs. Auguria is driving the transformation of traditional security operations by optimizing data for human and AI consumption with the industry’s first Security Knowledge Layer. SecOps’ Data Dilemma | How to

S Ventures Invests in Auguria to Solve SecOps Overload Read More »

PinnacleOne ExecBrief | Malicious Insider Threat to Strategic Enterprises

Last week, PinnacleOne examined China’s application of emerging AI tools to augment their rapidly improving cyber capabilities and emphasized the urgency for defenders to keep pace. This week, we focus on the recent arrest of a PRC national indicted for theft of Google AI IP and we identify lessons learned for firms to improve malicious

PinnacleOne ExecBrief | Malicious Insider Threat to Strategic Enterprises Read More »

Identity Security | How Best to Strengthen Enterprise Security

Identity-related attacks are one of the most common vectors of compromise in modern cyber attacks. In these attacks, threat actors work to steal identities, impersonating real users so they can move laterally and access resources on the network. Identities with greater access and admin-level privileges to valuable data are most likely to be stolen or

Identity Security | How Best to Strengthen Enterprise Security Read More »

Simplifying the Security Analyst Experience with Open Cybersecurity Schema Framework (OCSF)

In this blog, we dive into how the Open Cybersecurity Schema Framework (OCSF) improves the security analyst experience. By standardizing third party cybersecurity data through OCSF, SentinelOne enhances efficiency and effectiveness, enabling customers like Liberty Group to prioritize security operations over data acquisition challenges. This exploration offers insights into the real-world benefits and potential of

Simplifying the Security Analyst Experience with Open Cybersecurity Schema Framework (OCSF) Read More »

Kryptina RaaS | From Underground Commodity to Open Source Threat

One of the key drivers behind the explosion in ransomware attacks over the last five years and more has been the development and proliferation of the ransomware-as-a-service model, a means of providing cybercriminals with easy to use, low cost tools with which to undertake and manage ransomware campaigns. Developers benefit from a steady stream of

Kryptina RaaS | From Underground Commodity to Open Source Threat Read More »