Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Architecture Still Wins: Making SASE & SD-WAN Work Without Compromise

The shift to cloud, SaaS, and hybrid work is no longer breaking news. What is surprising is how many IT and network teams are still trying to stitch together architectures that weren’t designed for today’s distributed world. Data is everywhere. Users are everywhere. Applications live across SaaS, public cloud, and private data centers. Yet too often, traditional network and security architectures can’t keep up, creating bottlenecks, security gaps, and user frustration.

AI-Driven Cyber Defense in Action: How AI Agents Are Saving SOC Analysts From Burnout

AI-powered SOC platforms are revolutionizing cybersecurity by dramatically reducing false positives and enabling analysts to focus on high-value security work. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Grant Oviatt, Head of Security Operations at Prophet Security, to explore how AI agents are transforming security operations centers (SOCs) and reshaping the future of cyber defense.

99% False Positives. Why Security Analysts Are Burned Out

•The brutal truth about cybersecurity work: Analysts spend their days chasing 99% false positive alerts instead of doing meaningful security work. Grant Oviatt reveals why security professionals didn't get into the field to send Slack messages asking if someone is "supposed to be traveling to Mexico today." This is why AI agents are becoming essential - to let security pros focus on what they actually signed up for!

Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

It’s no secret that the software development life cycle is becoming more complex. With a plethora of libraries, frameworks, and now AI coding agents and assistants, we can build far more ambitious software in a fraction of the time. This is fantastic! But with it come greater opportunities for accidental or malicious security bugs and vulnerabilities to sneak in undetected, with potentially devastating consequences for your users and their trust in your company.

FBI Alert: Extortion Gang Targets Law Firms With Social Engineering Attacks

The FBI is warning that the Silent Ransom Group (SRG) is targeting law firms with IT-themed social engineering attacks and callback phishing emails. SRG is a cybercriminal gang that demands ransoms in exchange for not leaking stolen data. “SRG has been operating since 2022 and has primarily been known for their callback phishing emails, masquerading as well-known businesses who offer subscription plans,” the FBI explains.

Copyright-Themed Phishing Lures Target Europe

A phishing campaign is targeting European countries with lures themed around copyright infringement, researchers at Cybereason warn. The phishing emails are designed to deliver the Rhadamanthys infostealer malware. “These campaigns often involve emails impersonating companies and their legal departments, falsely claiming recipients have violated copyright on social media or elsewhere and demanding content removal,” the researchers write.

How Falcon Next-Gen SIEM Protects Enterprises from VMware vCenter Attacks

Internet-facing assets are targeted for many reasons, such as to establish persistence, evade defensive capabilities, and access sensitive networks. According to the search engine Shodan, approximately 1,600 VMware vSphere instances are directly accessible via the internet, representing a significant attack surface.

How Can Deception Technology Fortify Industrial IoT Networks Against Cyber Threats?

Industrial IoT (IIoT) networks are under siege—from ransomware attacks that halt production lines to nation-state actors targeting critical infrastructure. Yet, traditional security measures struggle to keep up with these stealthy and persistent threats. This lack of visibility and proactive detection leaves security teams blind to lateral movement and insider threats lurking within OT environments.