Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Arctic Wolf Delivers Managed Detection and Response with Broad Visibility and Proactive Security

In this Managed Detection and Response overview, we see how Arctic Wolf delivers 24x7 monitoring, broad visibility, response capabilities and proactive security recommendations to our customers leveraging their existing security tools and the Aurora Platform.

Stop Gambling on Compliance: Why Near100% Recall Is the Only Standard for AI Data

LLMs, agents and retrieval‑augmented models are increasingly being adopted for product analytics, customer support and decision‑making workflows. With that scale comes exposure: AI privacy and security incidents incidents involving customer PII are more common than ever and becoming a compliance issue. Let’s look at the statistics: These underscore the importance of robust guardrails and why relying on privacy tools with mediocre recall is a gamble.

Tanium Converge 2025 Recap - Tanium Tech Talks

Tanium Converge 2025 announced some amazing tech! Join the Tanium talkers for an insiders look as we review what happened during this special week. Find out which keynotes to watch on-demand for free. Also check out the other in-person Converge interviews on the Tanium Tech Talks playlist on the channel here. Will we see you there in 2026? Tanium's 2025 Converge user conference was held November 17-20 in Orlando, Florida. Converge 2026 will be in Las Vegas, Nevada, November 16-19..

Introducing the New Security-Focused Path Search View in Forward Enterprise

Chris Naish from Forward Networks introduces a new security-centric feature in the Forward Enterprise release version 25.10. The Security Focused Path Search View highlights devices responsible for traffic restriction or IP address translation, improving network path comprehension for security analysis. This mode filters out non-restrictive hops, allowing security professionals to efficiently access crucial information.

New Criminal Toolkit Abuses Browser Push Notifications

A new criminal platform called “Matrix Push C2” is using browser notifications to launch social engineering attacks, according to researchers at BlackFog. “This browser-native, fileless framework leverages push notifications, fake alerts, and link redirects to target victims across operating systems,” the researchers write.

KnowBe4 Is a Leader In the Gartner Magic Quadrant for Email Security For the Second Consecutive Year

Following its launch in 2024, Gartner has now published the second Magic Quadrant for Email Security —and KnowBe4 is delighted to once again be named a Leader! Email security is critical for all organizations globally. Fueled by factors such as GenAI and crime-as-a-service toolkits, the phishing threat landscape continues to become more sophisticated at an alarming pace.

Is AI taking entry-level jobs a good thing? #cybersecurity #ai #podcast

There's growing concern that AI automation is removing the hands-on experience junior analysts need to develop into senior defenders. In this Intel Chat, Matt Bromiley and Chris Luft challenge that assumption. Matt breaks down why the traditional entry-level path of endless log review and alert triage was never the best training ground to begin with. Log detection, alert triage, and drift detection are often cited as how defenders learn the trade. But most analysts never had time to get to drift detection because they were buried in repetitive work.