Blog

The Future As One | Major Announcements from SentinelOne’s Inaugural OneCon

Last week in beautiful Boca Raton, SentinelOne hosted OneCon, our first-ever customer customer conference, which brought together some of the brightest minds from the cybersecurity community today. Even in its earliest stages, we envisioned OneCon to be the industry’s most forward-thinking event, aimed at exploring new and innovative ways of thinking about security. For those […]

The Future As One | Major Announcements from SentinelOne’s Inaugural OneCon Read More »

Announcing the Integration of SentinelOne CWPP with Snyk Container

SentinelOne is thrilled to announce general availability (GA) of the integration between our real-time, AI-powered cloud workload protection platform (CWPP) with Snyk Container. The integration and partnership helps cloud security practitioners, AppSec, and developers more seamlessly collaborate to streamline triage, stop the spread of security incidents for containerized workloads, and solve root cause of issues

Announcing the Integration of SentinelOne CWPP with Snyk Container Read More »

Welcoming Our New President & Chief Revenue Officer | Q&A with Michael Cremen 

Today, we are thrilled to welcome Michael Cremen to SentinelOne as our President and Chief Revenue Officer. Michael is an accomplished international executive with extensive GTM experience in scaling software and SaaS companies. He will be responsible for the planning, development and global execution of our GTM strategy as we continue to evolve our business

Welcoming Our New President & Chief Revenue Officer | Q&A with Michael Cremen  Read More »

Hacktivism in the Israel-Hamas Conflict | Citizen Data Leaked Using Old Malware

The current conflict between Israel and the Hamas militant group has begat an onslaught of hacktivist-level activity carried out in the name of both sides. Amongst the ongoing fighting, numerous hacktivist groups and ‘lone wolves’ have taken the opportunity to maneuver into the cyber arena, deploying an array of malicious activities including Distributed-Denial-of-Service (DDoS) attacks,

Hacktivism in the Israel-Hamas Conflict | Citizen Data Leaked Using Old Malware Read More »

Decrypting SentinelOne’s Detection | An In-depth Look at Our Real-Time CWPP Static AI Engine

Artificial intelligence (AI) is such a hot topic right now with everyone clamoring to say how their company is leveraging AI in all the new, flashy ways. Here at SentinelOne, we don’t do hype or hyperbole and AI is nothing new. We were founded in 2013 on the premise that AI could fundamentally transform cybersecurity

Decrypting SentinelOne’s Detection | An In-depth Look at Our Real-Time CWPP Static AI Engine Read More »

The Realm of Ethical Hacking | Red, Blue & Purple Teaming Explained

Businesses continue to digitize their critical infrastructures and operations, expanding their attack surface and exposure to various threat vectors. To combat this, leaders are recognizing the value of having in-house experts who can think like cybercriminals and help build a proactive stance against attackers. Considering new and constant developments in the cyber threat landscape, business

The Realm of Ethical Hacking | Red, Blue & Purple Teaming Explained Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 42

The Good | Ragnar Locker’s Tor & Leak Sites Taken Down In International Seizure Ragnar Locker took a serious blow this week when authorities seized the ransomware operation’s Tor negotiation and data leak sites. This is the latest takedown coordinated across over a dozen international authorities. Now, visitors to the once-infamous sites are greeted with

The Good, the Bad and the Ugly in Cybersecurity – Week 42 Read More »

Social Engineering Attacks | How to Recognize and Resist The Bait

While much of cyber news often revolves around novel malware strains and high-profile data breaches, one threat that often flies under the radar relies on human vulnerability rather than technical vulnerabilities: social engineering attacks. This type of attack exploits people’s most innate tendency to trust, comply, and share information. This is what makes these attacks

Social Engineering Attacks | How to Recognize and Resist The Bait Read More »