-
CVE-2025-0282 (CVSS 9.0): Ivanti Confirms Active Exploitation of Critical Flaw
CVE-2025-0282 (CVSS 9.0): Ivanti Confirms Active Exploitation of Critical Flaw Ivanti has issued a security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and Neurons for ZTA Gateways. The vulnerabilities—CVE-2025-0282 and CVE-2025-0283—pose signif … Read more Published Date: Jan 08, 2025 (3 hours, 3 minutes ago) Vulnerabilities has been mentioned in this article. Go to…
-
Autonomous SOC Is a Journey, Not a Destination | Introducing The Autonomous SOC Maturity Model
Learn about autonomous SOC and how SentinelOne uses a maturity model to frame the shifts it will bring to day-to-day security operations. The autonomous SOC: A well-grounded vision for the future of machine speed, AI-driven cyber defense, or nothing more than a pipe dream? Few concepts in modern security have been as polarizing, with sides…
-
First Things First | SentinelOne Is A Fortune Best Workplace for Parents
SentinelOne is included in this year’s Fortune Best Workplaces for Parents, ranking among the top 70 companies worldwide for working parents. Wellbeing comes first at SentinelOne – for our customers, our communities, and our colleagues. We are proud to foster a culture of diversity, equality, and understanding for all. Supporting our working parents and the…
-
Protecting AI Infrastructures | Introducing SentinelOne’s AI Security Posture Management (AI-SPM)
SentinelOne’s new AI Security Posture Management (AI-SPM) solution helps organizations secure their AI workloads effectively. The widespread adoption of AI introduces unique security considerations. Misconfigurations in AI infrastructure and unsecured APIs can create weaknesses that cybercriminals will exploit. In this blog post, we dive deep into how SentinelOne’s agentless AI Security Posture Management (AI-SPM) solution…
-
US Cyber Trust Mark logo for smart devices is coming
The White House announced the launch of the US Cyber Trust Mark which aims to help buyers make an informed choice about the purchase of wireless internet-connected devices, such as baby monitors, doorbells, thermostats, and more. The cybersecurity labeling program for wireless consumer Internet of Things (IoT) products is voluntary but the participants include several…
-
4 reasons you should you use 2FA apps over SMS-based authentication
2FA over SMS isn’t just unreliable, it’s also a security risk. MFA, or Multi-Factor Authentication, has proliferated throughout our computing lives over the last decade. It largely began with SMS-based authentication in addition to a password, allowing users to add an extra layer of authentication by forcing users to enter a code sent to their…