Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Corelight Deployed Zeek at 20 Sites in 4 Months After 7-Year Stalemate

Corelight CEO Brian Dye shares the story of the company’s first multi-million-dollar customer—a team that had spent seven years trying to operationalize Zeek using another commercial vendor. With Corelight, they were up and running across 20 sites in just four months. This story highlights the foundational value Corelight provides: a hardened, scalable Zeek deployment that unlocks visibility, incident response, and threat hunting at scale.

You've got the traffic, but what about the conversions?

If your Shopify store is losing customers at critical checkpoints, now’s the time to act. Learn how to fix your sales funnel in our upcoming Exclusive Webinar: ����������: Turning Visitors into Buyers: How to Reduce Customer Drop-Offs and Increase Conversions�������� & ��������: June 11th, 2025 (12:30 PM CEST) | June 12th, 2025 (3:00 PM EDT)

Best SAST Tools: Top 10 Solutions Compared

SAST tools automatically scan the source code of an application. The goal is to identify vulnerabilities before deployment. SAST tools perform white-box testing, which involves analyzing the code based on inside knowledge of the application. SAST offers granularity in detecting vulnerabilities, providing an assessment down to the line of code.

CVE-2025-20286: PoC Available for Critical Cisco Identity Services Engine Static Credential Vulnerability

On June 4, 2025, Cisco released fixes for multiple vulnerabilities, several of which were noted to have publicly available proof-of-concept (PoC) exploit code. The most severe issue, CVE-2025-20286, affects cloud deployments of Cisco Identity Services Engine (ISE) on Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI).

The Journey to SASE: a CxO Perspective | SASEfy 2025

True transformation happens when networking and security move at the speed of business. That’s what SASE makes possible. In his session at, Cato’s Chief Strategy Officer Yishay Yovel, shares how SASE aligns infrastructure and business transformation — creating a platform that’s simple, agile, and future-ready.

API Security Issues

How to Fix the Challenges with Web App Firewalls A10 expert Jamison Utter discusses with Gary Wang why API security is a challenge to manage, as these APIs are headless and cannot be accessed through a login. There is no authentication mechanism, such as completing a CAPTCHA. APIs are also vulnerable to bots, which complicates matters. Watch the full video to learn more about multi-layered approaches, threat intelligence, behavioral analysis, and protection against modern threats like bots and APIs.

What Are Non-Human Identities, and Why Should Security Teams Care?

Security breaches are increasingly expensive and harder to spot, extending beyond common attacks like phishing. Attackers are now targeting the least visible parts of your infrastructure: non-human identities (NHIs). NHIs outnumber human identities by 45:1 in cloud environments—these include service accounts, APIs, applications, and bots that interact with systems and access sensitive data.