Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

CrowdStrike Named a Leader in the 2025 GigaOm SIEM Radar Report

CrowdStrike is proud to be named a Leader and Fast Mover in the 2025 GigaOm Radar for Security Information and Event Management (SIEM). This recognition positions CrowdStrike Falcon Next-Gen SIEM as the core of the AI-native SOC and future of security operations. CrowdStrike earned perfect 5/5 scores in key areas including Attack Surface Coverage, LLM-Based Co-Pilot and Agents, Automation, and Threat Research Units.

PIT Crew - Kinetic Solutions - Tanium Tech Talks #133

Tanium's PIT Crew program, "Partner Innovators of Tanium", is an exclusive global community of talented technologists and visionaries who share our passion for driving customer success, protecting critical IT infrastructure from bad actors, and helping shape the evolution of Autonomous Endpoint Management (AEM). Today meet Ethan from Kinetic Solutions: Global Tanium services based out of Wisconsin USA.

Transform Security Investigations in Seconds #teleport #securecloud #identity #blueteam

Discover how AI is revolutionizing security operations by automatically analyzing millions of log lines to provide instant user activity summaries. Learn how this game-changing tool can summarize 24-48 hours of user data including critical actions, IP addresses, locations, and working patterns - eliminating the need for manual log investigation. Perfect for security teams looking to streamline their workflow and improve threat detection efficiency.

MTTD vs. MTTR: Definition, Differences, & Why They Matter

When a cyberattack occurs, every second counts. Metrics like Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) are critical benchmarks in cybersecurity, helping organizations evaluate the effectiveness of their Security Operations Centers (SOCs). But what’s the difference between MTTD vs MTTR, and why do they matter?

Critical Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC

On June 25, 2025, Cisco disclosed two critical vulnerabilities affecting Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). Tracked as CVE-2025-20281 and CVE-2025-20282, these flaws enable unauthenticated remote attackers to execute arbitrary commands as the root user via exposed HTTPS APIs. CVE-2025-20281 arises from insufficient validation of user-supplied input in a public API, allowing crafted requests to trigger remote code execution.

What's Really Putting SMBs at Risk? These 8 Cybersecurity Myths

If you’ve done everything you can think of to stay protected — patched systems, trained employees, upgraded tools — but the number of threats still keep increasing, you’re not alone. You’re not behind. You’re not unprepared. But you may be operating on outdated assumptions. For small and midsize businesses, the real danger isn’t just what attackers are doing—it’s the cybersecurity myths you’ve been told to believe. The ones that seem logical.

When AI Agents Go Rogue: What You're Missing in Your MCP Security

We’re at a major inflection point in how software operates. And I don’t say that lightly. For the past decade, we’ve seen a steady evolution toward microservices, APIs, and cloud-native architectures. But Agentic AI is something different. We’re no longer talking about static services. We’re now dealing with autonomous agents that reason, remember, and act in real-time across live environments.

The Principle of Least Privilege: Key Benefits and Implementation Tips

Excessive access rights increase the risk of cybersecurity incidents. Implementing the principle of least privilege (POLP) can help you significantly limit your attack surface and protect your organization from the financial and reputational losses that may follow a cybersecurity breach. This article reveals the importance of POLP and equips you with the best practices to implement it effectively.