Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LastPass's Christofer Hoff on navigating incidents while building a security org from scratch

The Future of Security Operations podcast has officially returned for its sixth season and I can't think of a better guest to kick things off than Christofer Hoff. Christofer has over 30 years of experience in network and information security architecture, development, engineering, operations, and management, including security leadership roles at Bank of America, Citadel, and Juniper Networks.

A CTO's Guide to Network Penetration Testing Tools

Most teams approach network penetration testing the same way: pick a few well-known tools, run automated scans, and call it a day. But in today’s evolving threat landscape, that is a losing strategy. Attackers do not just rely on off-the-shelf exploits but adapt, chain vulnerabilities, and find gaps that automated tools miss. CTOs and engineering leaders need to rethink their approach with respect to context, strategy, and how they integrate into your security workflow.

Pentesting as an Engineering Problem

Imagine a bridge built without stress testing, where engineers only check for cracks after construction. When flaws inevitably appear, they scramble to patch weak spots until the subsequent failure forces another round of inspections. This is how most companies still approach pentesting: periodic assessments, reactive fixes, and security are treated as unwelcome checkpoints.

Top 5 Cyber Threats CultureAI Detected in Q1 2025

Cyber security threats continue to evolve, but one factor remains consistent: human error is still the greatest risk to modern businesses worldwide. Employees make mistakes, bypass security measures, and fall victim to sophisticated social engineering attacks, leading to devastating data breaches. Despite extensive security awareness training, the reality is that investing more time and money in training isn’t solving the problem.

The European Supply Chain Battlefield: Cybersecurity, National Defense, and the NIS2 Directive

In an increasingly interconnected digital world, supply chain security has become a critical concern for European organizations, policymakers, and national defense agencies alike. With adversaries exploiting software dependencies, contractors, and managed service providers (MSPs), the cybersecurity risks embedded within supply chains have never been more significant.

IONIX Unveils Parked Domain Classification

IONIX is proud to announce the launch of our new Parked Domain Classification capability within our Exposure Management platform. This feature enables security teams to intelligently categorize and monitor parked domains as distinct assets, significantly reducing alert noise while maintaining comprehensive visibility across your entire domain portfolio.

The Secrets of Test Coverage in Software Development

Test coverage is a fundamental aspect of creating reliable and high-performing software. When applied effectively, it provides a clear measurement of what parts of your codebase are being tested, identifying gaps that could allow subtle bugs to creep into production. Whether you're constructing a small application or managing a complex digital ecosystem, test coverage ensures that software performs as intended and gains users' trust.

Why WMS Is Now the Heart of a Smart Warehouse: The Tech Advantage in Logistics

Imagine running a warehouse where every order lands on time, inventory updates in real time, and picking errors are nearly extinct. Sounds futuristic? Not anymore. In today's high-speed logistics landscape, Warehouse Management Systems (WMS) have become more than just software-they're the nerve center of efficient, tech-driven operations. And if your warehouse isn't running on WMS yet, you're already behind.

Why Manufacturing Needs SASE: Securing Smart Factories and Global Operations

Imagine you’re the Director of IT for a global manufacturing company. You must keep production sites, suppliers, and remote workers securely connected while controlling costs and meeting compliance. Every day, new challenges arise: If this sounds familiar, you’re not alone. Manufacturing is rapidly evolving with Industry 4.0, where smart factories use automation, IoT, AI analytics, and real-time data to optimize production and efficiency.

Connect to Exchange Online PowerShell

Exchange Online PowerShell is a command-line management interface for administering and automating tasks in Exchange Online, which is a part of Microsoft 365. It allows administrators to manage user mailboxes, configure organizational settings, and perform bulk operations efficiently through scripting. Here are some benefits of using PowerShell for Exchange Online management.