Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Prescription for Protection: Healthcare Industry Observations from CrowdStrike Investigations

The healthcare sector continues to be a prime target for cyber adversaries, with threat actors constantly evolving their tactics to exploit vulnerabilities. Over the past year, CrowdStrike Services responded to a growing number of financially motivated attacks aimed at encrypting data and extorting victims across the healthcare ecosystem.

Minimizing False Positives: Enhancing Security Efficiency

Organizations waste enormous amounts of time chasing down security alerts that turn out to be nothing. Recent research from May 2025 shows that 70% of a security team's time is spent investigating alerts that are false positives, wasting massive amounts of time in the investigation rather than working on proactive security measures to improve organizational security posture.

Changed Block Tracking Guide for Virtual Machines

Changed block tracking (CBT) technology is essential for efficient virtual machine backups across virtualization platforms, yet persistent technical issues continue to create significant backup challenges. A notable rise in CBT-related problems spanning multiple hypervisors has led many IT teams to reassess their traditional backup strategies and explore more reliable alternatives.

Trustwave's Next Chapter: Joining Forces with LevelBlue to Create the World's Biggest MSSP

As CEO of Trustwave, I’m excited to share a pivotal development in our journey to deliver world-class cybersecurity to our clients: Trustwave has signed a definitive agreement to be acquired by LevelBlue, a global leader in AI-driven managed security services. This marks a significant milestone not only for our company but for the entire cybersecurity industry, as it brings together two recognized innovators to create the world’s largest pure-play Managed Security Services Provider (MSSP).

Exposure Management vs. Vulnerability Management: Key Differences and Why They Matter

Vulnerability management has hit a wall. Exposure management is how forward-looking teams break through it. According to Gartner, by 2026, organizations that adopt a continuous exposure management approach to guide security investments will be three times less likely to experience a breach. a more advanced and iterative approach to vulnerability management. Despite growing interest, confusion remains around what exposure management is and how it differs from vulnerability management.

How we fixed a session race condition at Vanta

Vanta provides audit firms and managed service providers (MSPs) with a dedicated console that allows them to oversee their clients and deliver audit and management services effectively. Partners work with their customers within their Vanta instances, conducting audits or helping them set up and manage their security and compliance program.

Are Your VPNs and NACs Secretly Sabotaging Your Security?

For many, the answer still involves legacy VPNs and Network Access Control (NAC), familiar tools from a different era. But what if those trusted systems aren’t protecting you anymore, and are instead becoming some of your biggest liabilities? To explore this shift, Netskope partnered with Cybersecurity Insiders, a leading research platform for CISOs and cybersecurity professionals, to dig into the real risks of relying on outdated access solutions.

When "Secure by Design" Isn't Enough: A Blind Spot in Power Platform Security Access Controls

Security Groups play a pivotal role in tenant governance across platforms like Entra, Power Platform, and SharePoint. They allow administrators to control access, enforce identity-aware security, and prevent unauthorized interactions. However, we’ve identified a security group bypass risk: Application Users (App Users) - Service Principal identities from Entra - can slip past Security Group restrictions, creating misaligned identity assumptions and enabling unauthorized data access.