Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unmanaged Doesn't Have to Mean Unprotected

Today’s enterprises are more fluid than ever. Employees work from personal devices, contractors join from unmanaged devices, and IT teams are expected to secure it all—without adding complexity or degrading performance. But most secure access tools were never built for this reality. The Cato Browser Extension offers a better way forward. It brings zero-trust access to unmanaged devices, BYOD, or third-party systems without installing endpoint software.

Detecting EDR Evasion with Corelight Open NDR

This video walks through how Corelight Open NDR helps security teams detect EDR evasion by delivering complete visibility across all network assets. Using a real-world scenario, the video demonstrates how anomaly detection uncovers suspicious activity, mapping events directly to MITRE ATT&CK techniques. The investigation process highlights the detection of an anomalous user agent, which ultimately reveals a Linux privilege escalation toolkit.

Hunting GTPDOOR: The case of the "Black Hat Positive"

Ben Reardon, Lead Researcher Corelight Labs / NOC crew I'm a researcher on the Labs team at Corelight and, for me, working in the Black Hat Network Operations Center (NOC) at the USA show in Las Vegas is up there as one of the most interesting and intense activities on the calendar.

No More Weak Links: Unleashing NDR and SASE for Hybrid Networks

The perimeter is gone. Hybrid work is here to stay. And MSPs sit at the crossroads of a network security evolution. This webinar focuses on how Network Detection and Response (NDR) and Secure Access Service Edge (SASE) are changing security delivery, showing MSPs how to lead this evolution. It will help you distinguish between hype and actionable strategies, empowering you to approach hybrid environments with a security-first mindset and evolve network security beyond traditional firewalls.

Tackling the Modern WAF Challenge: Why Managed WAAP Is the Key to Effective Application Security

Organizations today face a continuous struggle to secure their web applications against threats that constantly evolve in the fast-paced digital landscape. The Web Application Firewall (WAF) serves as a primary line of defense against these threats; however, its management challenges often outweigh its security benefits, resulting in organizations not realizing the full value of their security investment.

How Businesses Use VPNs to Protect Remote Workers

With the pandemic hitting the entire world in 2020, remote work has become the new normal. This offers flexibility, access to global talent, and cost savings; however, it comes with its own adversities. The new challenge is online safety and cyber theft. Public Wi-Fi or home internet connections are not that safe and secure. Therefore, using a VPN for remote workers has become a necessity due to the growing safety factors.

Cisco Patches ASA, FTD, and IOS Vulnerabilities, Including Critical and Exploited Flaws

On September 25, 2025, Cisco released fixes for two vulnerabilities in Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) that are currently being actively exploited by a sophisticated threat actor. The US Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 25-03 requiring Federal Civilian Executive Branch (FCEB) agencies to patch these vulnerabilities by 12 PM EDT on September 26.

DDI Central + OpManager Plus: How admins can achieve unified visibility into their network resources

Network administrators today require a unified solution that consolidates network services, resources, and configurations onto a single platform for seamless management. One of the key needs is complete visibility into connected devices, leased IP addresses, and their status, utilization, and availability. With the ever-growing number of devices joining enterprise networks, manually tracking each device and its IP address is both time-consuming and inefficient.