Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Guide on Securing Azure Blob Storage: Best Practices and Key Features

Azure Blob Storage is an object storage solution. It stores massive amounts of unstructured data, such as text files, images, videos, etc. It supports large-scale data for applications such as backup, data lakes, and media serving. Specifically, Azure Blob Storage security prevents unauthorized access, data leakage, and potential breaches.

Stratoshark Explained: Wireshark for System Calls, Containers & Cloud

What if you could analyze system calls, containers, and cloud workloads the same way you analyze packets in Wireshark? That’s exactly what Stratoshark does — deep visibility into hosts, containers, and cloud activity. Stratoshark is an open source analysis tool that brings the Wireshark-style workflow to system calls, containers, hosts, and cloud audit events.

Arctic Wolf Observes Malicious Configuration Changes On Fortinet FortiGate Devices via SSO Accounts

Starting on January 15, 2026, Arctic Wolf began observing a new cluster of automated malicious activity involving unauthorized firewall configuration changes on FortiGate devices. This activity involved the creation of generic accounts intended for persistence, configuration changes granting VPN access to those accounts, as well as exfiltration of firewall configurations.

Duo Certificate Authority (CA) bundle update: Important changes coming February 2026

As technology evolves, so do the security foundations that underpin the systems we rely on every day. One such foundational change is coming soon from Cisco Duo, the widely‑used multi‑factor authentication (MFA) platform that many organisations deploy to secure access to critical systems. Although this change isn’t a vulnerability in the traditional sense, it could impact the availability of Duo authentication services for outdated software and integrations.

Planning Your Workload Identity Roadmap: Standards, Patterns, and the Path Ahead - Webinar

With 100x more non-human identities than human identities expected in 2025, the way we manage machine credentials is fundamentally broken. 83% of attacks involve compromised secrets, yet many organizations still rely on hardcoded keys, sprawling secrets, and scattered vault deployments.

Falcon for IT: Intelligence-Driven Defense and Response at Scale

Modern security teams need complete visibility across every asset to reduce exposure and stop threats before they escalate. Gaps in visibility, unmanaged devices, and delayed remediation increase risk and give adversaries more opportunity to operate. Falcon for IT empowers SecOps with the visibility and context needed to take decisive action.