Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Uncover Hidden AD Group Risks & Privileged Access with Netwrix Auditor

Do you know who has actual privileged access in your Active Directory? In this webinar, see how Netwrix Auditor for Active Directory uncovers the real story behind administrative group membership, including nested permissions, effective access, and misaligned rights with built-in reporting and alerting.

Cato Browser Extension: Secure Access for Any User

Unmanaged and BYOD devices create significant security and compliance challenges for today's enterprises. The Cato Browser Extension addresses these issues head-on by providing secure, lightweight, and consistent browser-based access for contractors, vendors, and remote workers—without the headaches of traditional VPNs.

Beyond Agent-Washing: How Torq Delivers True Agentic Automation for Security

Eldad Livni is the Co-Founder and Chief Innovation Officer at Torq. Prior to founding Torq, Eldad co-founded and served as CPO of Luminate Security, a pioneer in Zero Trust/SASE. Following Luminate’s acquisition by Symantec, he went on to act as CPO of Symantec’s Zero Trust/Secure Access Cloud offering. The security industry has a new buzzword problem.

From Fragments to Full Picture: Turning Threat News into Actionable Campaign Intelligence

Consider this scenario: a critical zero-day vulnerability is announced for a popular enterprise software and you, as a threat analyst, are tasked with briefing leadership on which threat actors are exploiting it and how. You start to research and are immediately overwhelmed. One news site reports on a Chinese APT using the exploit, another blog details an Iranian group, and a third report lists CVEs without context.

OCSF for Security Hub: Sumo Logic and AWS speaking the same language

In technology, the proof of a lasting relationship is in the infrastructure — the pipelines, security services, and log plumbing have to work seamlessly together long before anyone sees the outcome. That’s precisely what Sumo Logic and AWS have built. Aligned around open standards like OCSF (Open Cybersecurity Schema Framework), integrated with services like Security Hub and GuardDuty, and connected through shared telemetry, it makes cloud security and observability possible at scale.