Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beyond The Breach: How Businesses Can Recover and Rebuild Trust

In the world of cybersecurity, this statement couldn’t be more relevant. Trust is the invisible thread that binds a company to its customers, partners, investors, and even its employees. It’s what gives users the confidence to share their personal data, stakeholders the faith to invest, and teams the motivation to innovate. But trust is fragile, especially in a digital age where one breach can unravel years of credibility in a matter of minutes.

Privileged Account and Session Management (PASM): Key Features & How to Deploy It

The risks associated with privileged accounts have significantly escalated recently. According to the 2025 Cost of Insider Risks Report by Ponemon Institute, insiders who fall victim to credential theft now represent the most expensive risk, with an average per-incident cost surging to $779,797 — up from $679,621 in 2023. When stolen credentials belong to privileged accounts, the potential damage is even greater.

Is Chasing the So-Called 'Best-Of-Breed' Cybersecurity Solutions Smart?

Let’s be honest: Chasing after the so-called ‘best-of-breed’ cybersecurity solutions might seem smart, but it often sets you up for operational headaches. It’s tempting—especially given the persuasive pitches from top-tier vendors—to select the best individual products for each security function.

Tanium + Microsoft: Real-time, actionable intelligence

In today’s threat landscape, endpoints are the frontline—and attackers are relentless. Discover how Microsoft Security Suite and Tanium combine forces to deliver a unified, AI-powered platform for real-time threat detection, Autonomous Endpoint Management (AEM), and streamlined IT operations. Tanium brings real-time actionable intelligence to the Microsoft Security Suite, so you can make immediate decisions on the current state of your IT landscape.

Tanium Solution Demo: Endpoint Management

The Tanium Endpoint Management solution offers cross-platform lifecycle management from a single console, delivering visibility and control over endpoint assets both on-premises and in the cloud. The solution begins with provisioning new endpoints and continues through the lifecycle of patch management and third-party software deployments, performance monitoring, policy enforcement and issue investigations to give administrators the ability to see, control and remediate in real time.

Making Tanium Your Own - Tanium for Help Desk - Tanium Tech Talks #131

Every Tanium customer wants fast results specific to their environment. This episode brings together all the ingredients necessary for a customized experience, in this case for the service desk, providing massive value in efficiency. Identify your top tickets with scriptable solutions and turn them into packages Identify the data meaningful to you and collect it with custom sensors Build a Single Endpoint View with both data and actions for closing tickets Use RBAC to grant these items to the service desk Winning!

Securing Our Water: Understanding the Water Cybersecurity Enhancement Act of 2025

Cyberattacks on public infrastructure are no longer hypothetical. From ransomware disabling city services to foreign actors probing utility networks, the risks are real and rising. Among the most vulnerable targets are our public water systems. Often underfunded, technologically fragmented, and encumbered by legacy systems, water utilities are easy pickings for determined attackers.

Introducing the AI Agent action

Today, we’re announcing a way to build and deploy agents in Tines through our AI Agent action. In the AI market, AI agents suddenly seem to be everywhere – software that can autonomously think and perform tasks on behalf of the user. But we’re still very early in the adoption curve of agents. One thing we’ve noticed is that most solutions can’t handle the varying complexities of mission-critical workflows.

CVE-2025-5777: Critical Information Disclosure Vulnerability "Citrix Bleed 2" in Citrix NetScaler ADC and Gateway

On June 23, 2025, Citrix updated the scope of a previously disclosed vulnerability—CVE-2025-5777—to clarify that it affects NetScaler devices configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. CVE-2025-5777, originally disclosed on June 17, is a critical-severity out-of-bounds read caused by insufficient input validation.

Enhancing Detection and Security Efficacy with the Behavioral Detection Engine in Aurora Endpoint Defense

In the ever-evolving cybersecurity landscape, staying ahead of emerging threats is a constant challenge. Traditional endpoint detection and response (EDR) solutions often suffer from alert noise, rule complexity, and slow adaptation to new attack techniques. That’s why Arctic Wolf is excited to introduce the Behavioral Detection Engine — an advanced detection and response framework embedded within Aurora Focus, the EDR module of Aurora Endpoint Defense.