Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NMAP Vulnerability Assessment Tutorial

Think your network is secure? Think again! Did you know that 88% of cybersecurity breaches are caused by human error or misconfiguration. Even more critically, if your business uses connected devices, over 50% of IoT devices have critical vulnerabilities that hackers can exploit right now, and one in three data breaches involves an IoT device. PCI DSS compliance demands regular vulnerability scanning (Requirement 11.2) – and that's exactly where a powerful tool like Nmap comes in!

CVE-2025-31324: Critical SAP Flaw Exposes Systems to Remote Attacks

Active exploit targets SAP NetWeaver via unauthenticated remote code execution. This flaw allows unauthenticated attackers to upload and execute arbitrary files, leading to complete system compromise. In this video, we break down how the vulnerability works, why it’s dangerous, and what steps you must take to secure your systems.

The Howler Episode 18: Lisa Tetrault, Senior Vice President, Security Services

This month, we sit down with Lisa Tetrault, Senior Vice President of Security Services, as she shares about her career journey, scaling the Security Operations Center (SOC) at Arctic Wolf from when we had less than 100 pack members to today, and the practices that keep her grounded and achieving her goals.

The Different Types of Authorization Models

Authorization models control who gets access to what. Learn about Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Relationship-Based Access Control (ReBAC), Mandatory Access Control (MAC) and Discretionary Access Control (DAC). Discover which model fits your organization’s needs.