News

In early May 2025, Cisco released software fixes to address a flaw in its IOS XE Software for Wireless LAN Controllers (WLCs) ...
CrowdStrike introduced several enhancements to its Falcon cybersecurity platform and Falcon Next-Gen SIEM at the RSA Conference 2025, highlighting artificial intelligence, managed threat hunting and ...
A newly discovered 0-click NTLM authentication bypass vulnerability has resurfaced within Microsoft Telnet Server implementations, exposing a dangerous flaw in outdated yet still-operational systems.
Security teams can analyze live network traffic, an approach also known as network detection and response, and be more proactive in detecting the warning signs of an impending breach.
Sr. Director of Global Product Marketing for Cato Networks, a leader of advanced cloud-native cybersecurity technologies. As a Silicon Valley veteran, Sangita has more than 15 years’ experience in ...
The passage of the CA/Browser Forum ballot to reduce the maximum certificate lifespan to 47 days represents a natural and anticipated progression in the industry’s ongoing effort to enhance security ...
Long lists of firewall rules can lead to misaligned and inconsistent policies, creating gaps in your security perimeter for threat actors to exploit.
This critical shift of social media apps becoming “mission-critical” everything apps requires a different approach when it comes to resiliency.
Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early ...
Can Streamlined Secrets Management Enhance Stability? Secrets management can be likened to a well-kept vault of confidential data, critical to the security and performance of any system. Where data ...
Are Your Investments in Cloud-Native NHIs Justified? A new hero has emerged, capable of handling complex security threats to cloud. Meet Non-Human Identities (NHIs), the machine identities that have ...