Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Making Tanium Your Own - Tanium for Help Desk - Tanium Tech Talks #131

Every Tanium customer wants fast results specific to their environment. This episode brings together all the ingredients necessary for a customized experience, in this case for the service desk, providing massive value in efficiency. Identify your top tickets with scriptable solutions and turn them into packages Identify the data meaningful to you and collect it with custom sensors Build a Single Endpoint View with both data and actions for closing tickets Use RBAC to grant these items to the service desk Winning!

Securing Our Water: Understanding the Water Cybersecurity Enhancement Act of 2025

Cyberattacks on public infrastructure are no longer hypothetical. From ransomware disabling city services to foreign actors probing utility networks, the risks are real and rising. Among the most vulnerable targets are our public water systems. Often underfunded, technologically fragmented, and encumbered by legacy systems, water utilities are easy pickings for determined attackers.

Introducing the AI Agent action

Today, we’re announcing a way to build and deploy agents in Tines through our AI Agent action. In the AI market, AI agents suddenly seem to be everywhere – software that can autonomously think and perform tasks on behalf of the user. But we’re still very early in the adoption curve of agents. One thing we’ve noticed is that most solutions can’t handle the varying complexities of mission-critical workflows.

CVE-2025-5777: Critical Information Disclosure Vulnerability "Citrix Bleed 2" in Citrix NetScaler ADC and Gateway

On June 23, 2025, Citrix updated the scope of a previously disclosed vulnerability—CVE-2025-5777—to clarify that it affects NetScaler devices configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. CVE-2025-5777, originally disclosed on June 17, is a critical-severity out-of-bounds read caused by insufficient input validation.

Enhancing Detection and Security Efficacy with the Behavioral Detection Engine in Aurora Endpoint Defense

In the ever-evolving cybersecurity landscape, staying ahead of emerging threats is a constant challenge. Traditional endpoint detection and response (EDR) solutions often suffer from alert noise, rule complexity, and slow adaptation to new attack techniques. That’s why Arctic Wolf is excited to introduce the Behavioral Detection Engine — an advanced detection and response framework embedded within Aurora Focus, the EDR module of Aurora Endpoint Defense.

Inside the Early Lessons of DORA Compliance: What Works, What Fails, What's Next?

Six months into DORA — is financial services building real resilience or just ticking boxes? In this episode of Razorwire, host James Rees is joined by Richard Cassidy, Jonathan Care, and first-time guest Romain Deslorieux to dissect how the Digital Operational Resilience Act (DORA) is really playing out in financial services — beyond the policies and into the pressure.

Machine identity mayhem: The volume, variety, velocity challenge

Machine identities—like the API keys, certificates, and access tokens that secure machine-to-machine connections—are swarming businesses. Yet, many teams still reach for manual tools while their systems overclock. At the start of the year, I predicted the ratio of machine to human identities would likely soon tip past 100:1. As of mid-year, most organizations are clocking in at more than 80:1—and I’ve seen environments as high as 500:1.

Why Founders Should Care About Organic Traffic Early

Did you know that the result in Google's organic search results gets a 27.6% click-through rate? Your startup needs to understand that organic search drives much of most businesses' website performance. The numbers tell the story - first page results capture over 90% of all organic traffic.