Network Security

Understanding XDR | A Guided Approach for Enterprise Leaders

Cyber adversaries operate with a level of finesse and precision that can catch organizations off guard. In seconds, they can lure unsuspecting employees or partners with malicious files, exploit existing vulnerabilities to breach a network, and start moving laterally within a system to up their credentials. The impact of ransomware attacks extends beyond mere disruption; […]

Understanding XDR | A Guided Approach for Enterprise Leaders Read More »

Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future

What a few days it was at this year’s BlackHat cyber event in sunny Las Vegas! The stunning SentinelOne booth welcomed thousands of visitors who came to learn about PurpleAI, our newly launched Ranger Insights console, and all the ways the Singularity platform helps organizations protect their endpoints, secure their cloud, and unify their data.

Day 2 of Black Hat USA 2023 | Exploring The Power of a Threat Intel & AI-Driven Future Read More »

Day 1 of Black Hat USA 2023 | Generative AI, Automation & The Security Landscape of Tomorrow

SentinelOne has landed in Vegas for this year’s Black Hat security conference! Each year, Black Hat invites security gurus, researchers, hackers, and cyber enthusiasts from around the world to join in on two-days of keynotes by industry leaders as well as cutting-edge presentations and exclusive tech demos. We’ll be sure to keep you in the

Day 1 of Black Hat USA 2023 | Generative AI, Automation & The Security Landscape of Tomorrow Read More »

Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities

Leveraging known bugs and unpatched exploits continue to be an unyielding strategy for threat actors. Ranging from security bypasses and credential exposure to remote code execution, software vulnerabilities remain tools of the trade for cyber attackers looking for a way into lucrative systems. While new flaws found in Active Directory and the MOVEit file transfer

Enterprise Security Essentials | Top 12 Most Routinely Exploited Vulnerabilities Read More »

AD Security Assessments and Attack Paths | How to Achieve Greater Visibility

Active Directory (AD) has become a primary target for attackers launching identity-centric attacks. Fortunately, there are several tools available to help enterprise security teams get clearer visibility into their Active Directory instances and address any vulnerabilities they uncover. One popular tool in use by analysts is Attack Path graphs, which can be used to show

AD Security Assessments and Attack Paths | How to Achieve Greater Visibility Read More »