Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

RaccoonLine Technical Report Details the Efficacy of Residential P2P Nodes in Overcoming Range-Based IP Blocking

RaccoonLine, a decentralized networking provider, has released a technical report addressing the limitations of protocol obfuscation in the face of modern "range-based" IP blocking. The findings detail how national censorship systems now identify and blacklist data center IP ranges within hours of deployment, and how RaccoonLine's P2P residential node architecture provides a structural solution to this enforcement trend.

BlueVoyant Strengthens Cyber Defence for ODEON Cinemas Group Across Eight Countries

BlueVoyant announces that it has partnered with ODEON Cinemas Group (OCG), Europe's largest cinema operator, to unify and modernise its security operations across eight countries. The collaboration delivers 24/7 protection, rapid incident response, and enhanced visibility into thirdparty risk, significantly reducing operational noise and strengthening OCG's overall cyber resilience.

The Howler Episode 30 - Will May, Chief Revenue Officer

This month, we sit down with Will May, our new Chief Revenue Officer. Take a listen to get to know Will, his leadership philosophy, how he's using AI in his every day, and so much more! Will brings more than 15 years of go-to-market leadership experience across high-growth software, cybersecurity, and cloud technology companies. He has built a strong reputation for helping organizations adopt innovative technologies—including AI-driven platforms—to improve operational efficiency, reduce complexity, and deliver measurable business value.

Why Cybersecurity is Dead | The Cyber Resilience Playbook

“The cybersecurity industry as we knew it is dead." Rubrik CEO Bipul Sinha explains why the security industry’s obsession with "walls and detection" has failed. AI-powered attacks have reduced the window between intrusion and breach to zero seconds. The only path forward is a fundamental shift from reactive defense to preemptive recovery, at machine speed.

The New CISO Ep. 145 - Eric O'Neill | Lessons From a Spy Hunter: The Real Cost of a Breach (Part 1)

What does it feel like to stand in the smoking ruin of a ransomware attack? In this episode, Steve Moore is joined by former FBI undercover operative Eric O'Neill—the man who helped capture Robert Hanssen—to explain why modern cybercrime is just traditional espionage repackaged, and why the dark web has quietly become the world's third-largest economy.

MSPs, Cyber Resilience, & the Human Side of Security w/James McMillan - The 443 Pod - Episode 370

Marc Laliberte and Corey Nachreiner recorded a special episode from WatchGuard’s EMEA Partner Conference in Dubrovnik, Croatia, featuring James McMillan, CTO of Redinet Limited. They discussed the evolving cybersecurity landscape for MSPs and businesses across Europe. James shares insights from his journey in IT and cybersecurity, the growing challenges organizations face as threats become more sophisticated, and why cyber resilience requires more than just technology.

Detecting Identity Attacks at Scale with Herd Immunity

Modern identity‑based attacks often rely on shared infrastructure and reusable attack frameworks, rather than bespoke tooling built for a single target. Phishing kits and phishing‑as‑a‑service (PhaaS) platforms are the clearest example of this model — and today they are the most prevalent sources of account compromise across organizations of all sizes. Device code phishing illustrates how quickly this model evolves.

Cybersecurity in 2026: Why the Risk Is Bigger Than Ever

Cybersecurity is no longer something only large enterprises need to worry about. In 2026, it affects every organization, from small businesses and managed service providers to global companies and individual users. What has changed is not just the number of cyberattacks. It is how quickly they happen, how far they can spread, and how much damage they can cause.

Beyond the Breach: How Digital Forensics Is Evolving for Modern Cyber Risk

Cyberattacks still break trust. That hasn’t changed. What has changed is how quickly organizations are expected to understand what’s happening and act on it. In today’s environments, answers are demanded in minutes, not days. Leadership needs clarity while systems are still running, customers are still online, and the situation is still unfolding. This is where digital forensics is entering its next chapter.