Blog

Is Your Network Infrastructure Ready for More IoT Devices?

From Wi-Fi 6E (and the upcoming Wi-Fi 7 technologies) to smart cameras, IoT devices are expected to grow by 50% by 2027. As organizations leverage more of these intelligent, data-generating machines to boost employee productivity and user experience, they may want to consider the impact on the network. The associated data influx of additional IoT …

Is Your Network Infrastructure Ready for More IoT Devices? Read More »

A Platform for Cloud Success

Reduced costs, increased scalability, and faster innovation are just some of the reasons why companies around the world are rapidly adopting a cloud-first strategy for their IT operations. However, with the rate of technological change today, businesses must be extremely strategic with their investments, and cloud-first is not a one-size-fits-all solution. How can tech leaders …

A Platform for Cloud Success Read More »

Creating a Long-Term Strategy for Secure Remote Work

Hybrid and remote work have become a coveted way of life for many professionals around the world. The elimination of commutes, flexibility in scheduling, and opportunity to work in your pajamas is so appealing that nearly 50% of remote employees stated they would look elsewhere for employment in the event of a return-to-office mandate. Although …

Creating a Long-Term Strategy for Secure Remote Work Read More »

Connected Machines, Smarter Factories

In today’s dynamic manufacturing landscape, the Internet of Things (IoT) and cloud technology is a key driver of a transformational shift to Industry 4.0. Cloud networking  enables adaptability for manufacturers amidst the evolving challenges they face as part of this transformation. Here are key cloud networking capabilities that manufacturers can leverage for success along their …

Connected Machines, Smarter Factories Read More »

Exit Sandman | How SentinelOne Deflects APT-Level Identity Security Risks

Information theft and the number of data breaches rooted in identity-based risks are rising as attackers continue to exploit vulnerabilities and find ways to evade detection. This makes early detection one of the most critical pillars of defense across today’s attack surfaces. As identity-based threats continue to develop, organizations that focus on advanced detection and …

Exit Sandman | How SentinelOne Deflects APT-Level Identity Security Risks Read More »

PinnacleOne ExecBrief | Enterprise Risk Management in China

Last week, PinnacleOne flagged the ongoing SVR exploitation of their breach of Microsoft. This week, we examine the geopolitical dynamics and risks facing firms that do business or have key dependencies in China and highlight principles to frame a China-for-China strategy given firm-specific threat models. Please subscribe to read future issues — and forward this …

PinnacleOne ExecBrief | Enterprise Risk Management in China Read More »

Insights from the CyberLaw Forum | Intersecting Cybersecurity, Insurance & Regulation

SentinelOne’s CyberLaw Forum brings together lawyers, technical experts, and insurance executives to dive deep into challenges faced in today’s cyber insurance and legal realms. From the tactics of threat actors to contemplating the impact of artificial intelligence (AI) on enterprise security strategies, panelists from the event delved into the intricacies of cybersecurity in a rapidly …

Insights from the CyberLaw Forum | Intersecting Cybersecurity, Insurance & Regulation Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good | Russian Nationals Sanctioned for Roles in GRU-Linked Influence Campaigns Two Russian nationals are the latest to be sanctioned by the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) this week for their roles in various malign influence campaigns. Ilya Andreevich Gambashidze, the founder of Social Design Agency (SDA), and Nikolai Aleksandrovich …

The Good, the Bad and the Ugly in Cybersecurity – Week 12 Read More »