Network Security

PinnacleOne ExecBrief | Deep Tech In The Crosshairs

Last week, PinnacleOne highlighted how a new turn of phrase by China’s leader will spark efforts across the country to make scientific breakthroughs occur out of thin air (or steal them from the west). This week, we flag three emerging threats to the “deep tech” venture ecosystem underpinning western technological and strategic advantage. Please subscribe …

PinnacleOne ExecBrief | Deep Tech In The Crosshairs Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 24

The Good | Ukrainian Police Arrest Cryptor Specialist Helping Conti & LockBit Ransomware Operations A Russian national was arrested this week for allegedly working with Conti and LockBit ransomware groups, helping to make their malware undetectable and also conducting at least one attack himself. Ukrainian cyber police apprehended the 28-year-old man in Kyiv during Operation …

The Good, the Bad and the Ugly in Cybersecurity – Week 24 Read More »

Building a Defense Posture | Top 5 Cybersecurity Tips For Small & Medium Businesses (SMBs)

Verizon’s annual Data Breach Investigations Report has historically compared and contrasted small and medium businesses (SMB) against large organizations. Not this year. The reason: Both SMBs and large enterprises are increasingly sharing similar attack surfaces. With much of the same services and infrastructures, the difference between the two boils down to the available resources. Where …

Building a Defense Posture | Top 5 Cybersecurity Tips For Small & Medium Businesses (SMBs) Read More »

Navigating the NVD Backlog | How to Stay Ahead in Vulnerability Management

The National Vulnerability Database (NVD) is a critical – yet often overlooked – element of an organization’s security defenses. Established to provide a catalog of known software vulnerabilities, it has become an authoritative source of vulnerability intelligence. However, the NVD faces a troubling backlog of vulnerabilities raising existential concerns about its efficacy. This blog post …

Navigating the NVD Backlog | How to Stay Ahead in Vulnerability Management Read More »

Block Attacks with SentinelOne’s AI-Powered CNAPP

Market research soon to be published in the first annual SentinelOne Cloud Security Report shows that cloud security professionals are drowning in data, yet lacking insights. While many point-specific solutions like cloud security posture management (CSPM), cloud detection and response (CDR), and cloud workload protection platforms (CWPP) are now mainstream, organizations are struggling with data …

Block Attacks with SentinelOne’s AI-Powered CNAPP Read More »

Introducing Real-Time CWPP for Amazon ECS Fargate

Containers are popular because they are easy to build, test, and operate across a wide variety of infrastructure. Increasingly, serverless infrastructure services like AWS Fargate are preferred for containerized workload operations, because they allow organizations to focus their resources on innovation, while outsourcing the infrastructure management to their cloud service provider. In this blog post, …

Introducing Real-Time CWPP for Amazon ECS Fargate Read More »

PinnacleOne ExecBrief | China’s “New Quality Productive Forces”

Last week, PinnacleOne examined how China’s strategy for evading semiconductor technology controls is driving an increased insider threat issue for leading western enterprises. This week, we highlight how a new turn of phrase by China’s leader will spark efforts across the country to make scientific breakthroughs occur out of thin air (or steal them from …

PinnacleOne ExecBrief | China’s “New Quality Productive Forces” Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 23

The Good | FBI Obtains 7000 LockBit Decryption Keys Past victims of LockBit ransomware received a boon this week from the FBI who revealed they obtained over 7000 decryption keys which can be used to recover encrypted data. This was announced at the 2024 Boston Conference on Cyber Security, where both known and suspected victims …

The Good, the Bad and the Ugly in Cybersecurity – Week 23 Read More »

AWS Integrations | Enhancing Visibility & Powering Threat Hunting

As organizations go beyond simply migrating to the cloud and use cloud services strategically to accelerate their business outcomes, securing the cloud footprint has become a key element of this strategy. It’s also becoming increasingly complex with most organizations using multiple clouds, Saas-based tools, and security solutions within their stack to protect them. Gaining consistent …

AWS Integrations | Enhancing Visibility & Powering Threat Hunting Read More »

It’s Time to Take Control of Experiences and Transform Infrastructure Operations for AI

Today’s business outcomes are intrinsically linked to the quality of digital experiences IT professionals can deliver to connect employees and customers to any app or service.   Think about a video call for a remote worker. A user opens their app, turns on the camera, and has a meeting. Hopefully there were no hangups or drops …

It’s Time to Take Control of Experiences and Transform Infrastructure Operations for AI Read More »