Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top tips: Secure your devices before you disconnect for the holidays

Top tips is a weekly column where we highlight what’s trending in the tech world and share ways to stay ahead. This week, as the holiday season rolls in and many of us finally take that much-needed break, let’s talk about something equally important: Stepping away from work safely. The holidays are all about resting–logging off and soaking in all the merry feelings. But to truly switch into that much-needed DND mode, it helps to secure your devices before you head out for the holidays.

Is This Endgame? How Takedowns Are Reshaping eCrime

In November 2025, a major public-private sector collaboration took down three significant malware networks. Operation Endgame involved law enforcement agencies from six EU countries, Australia, Canada, the U.K., and the U.S., along with Europol and 30 private sector partners, including CrowdStrike. The dismantled infrastructure consisted of hundreds of thousands of infected computers containing several million stolen credentials.

Episode 4 - Staying Curious: Lessons from 25 Years in Cybersecurity

In Episode 4 of Corelight Defenders, I sit down with Angela Loomis, Corelight's Director of Technical Account Management, to explore her remarkable 25-year journey in cybersecurity. Angela shares her unconventional entry into the field, starting from a background in television production to becoming a leader in security strategy. We delve into the importance of curiosity in cybersecurity, discussing how diverse experiences enrich the profession, and whether formal education might dampen that curiosity.

7 Must-Have Features in Your CNAPP Solution

As organizations increasingly shift workloads, data, and applications to the cloud, the security landscape becomes more complicated. You’re no longer just managing a single environment, you’re managing dozens of services, containers, and APIs that are all interrelated and deployed across multiple clouds.

SASE in 2026: Why Convergence, Simplicity, and Zero Trust Require a More Technical Foundation

In 2026, one theme will become impossible for security and infrastructure leaders to ignore. The architecture that once secured the enterprise no longer aligns with how the enterprise actually works. Users are everywhere. Applications are everywhere. Data is everywhere. Threats are everywhere. What is not everywhere is consistency.

Turn Structured Data into Intelligent Action with Cribl and Tines

IT and security teams are stuck between two bad options: over-automate on noisy, incomplete data and risk eroding trust, or avoid automation and drown in manual triage. With surging data volumes and increasingly complex stacks, both choices drive alert fatigue, longer MTTD/MTTR, and analyst burnout. Tines and Cribl offer an alternative vision.

Detecting and Stopping Data Exfiltration in Real Time

Data exfiltration is no longer limited to elite external hackers — it’s a common occurrence in everyday business operations. Employees share files externally, upload documents to personal cloud accounts, copy source code to USB drives, or paste sensitive text into browser-based AI tools. Most of the time, these actions are unintentional.

How a Government Entity Transformed Atlassian User Management with miniOrange

In the public sector, IT efficiency isn't just about convenience - it’s about fiscal responsibility and strict compliance. Government agencies often manage thousands of users across Jira, Confluence, and Jira Service Management (JSM). As these environments grow, so does the complexity of managing access.