Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Howler Episode 22: The Two Year Anniversary Special!

The Howler Podcast is two years old! In this special episode, Chelsea and Mary are joined by some surprise co-hosts as well as pack members from around the globe as they celebrate Arctic Wolf's one-of-a-kind culture. Interested in running with the pack? Explore careers at Arctic Wolf—one of the fastest-growing and exciting cybersecurity companies in the world, to learn about how you can join our Pack, create impact, and influence what’s next in security operations.

When Secure Isn't Safe Uncovering OWASP Top 10 Business Logic Abuse

The OWASP Top 10 for Business Logic Abuse reveals the most critical ways attackers exploit the design of your applications, not just their code. Business logic abuse isn’t about SQL injection or XSS, it's about bypassing the rules, manipulating workflows, and triggering unintended behaviors in ways your functional tests never anticipated. Why this Matters? Attackers are shifting from exploiting code flaws to abusing the intended functionality of your applications.These logic-level threats are particularly dangerous because they.

From Black Hat to Boardrooms: Making Sense of the SASE Market Shift

Dave McGrail and Jaye Tillson cut through the noise on the biggest shifts in security right now. From Black Hat insights to Palo Alto’s CyberArk acquisition, they discuss what it all means for SASE, Zero Trust and the growing importance of identity. Plus, why VPN replacement is more than just a tech swap — and how choosing the right partner makes or breaks SASE transformation.