-
Customize the scope of IAM Access Analyzer unused access analysis
AWS Identity and Access Management Access Analyzer simplifies inspecting unused access to guide you towards least privilege. You can use unused access findings to identify over-permissive access granted to AWS Identity and Access Management (IAM) roles and users in your accounts or organization. From a delegated administrator account for IAM Access Analyzer, you can use the dashboard…
-
12 Months of Fighting Cybercrime & Defending Enterprises | SentinelLABS 2024 Review
From ransomware repurposed for espionage to increased exploitation of cloud platforms, learn about the key trends from SentinelLABS research in 2024. From the convergence of cybercrime and nation-state espionage to the strategic misuse of trusted platforms like Microsoft Azure and SaaS APIs, the cybersecurity landscape has grown more complex than ever in 2024. SentinelLABS has…
-
Open source all the way down: Upgrading our developer documentation
At Cloudflare, we treat developer content like a product, where we take the user and their feedback into consideration. We are constantly iterating, testing, analyzing, and refining content. Inspired by agile practices, treating developer content like an open source product means we approach our documentation the same way an open source software project is created…
-
SentinelOne Continues to Set the Standard in MITRE ATT&CK® Evaluations | 100% Detection, Zero Delays and 88% Less Noise
SentinelOne achieves 100% detection and zero detection delays in the MITRE ATT&CK® Evaluations: Enterprise 2024. In cybersecurity, speed and accuracy are necessities. Every second counts, and every detection could be the difference between resilience and breach. That’s why SentinelOne takes immense pride in protecting our customers, monitoring trillions of signals annually across organizations from SMBs…
-
How to Defend Against the Three Most Dangerous Cybersecurity Attacks
There are a lot of different hacking techniques to be aware of. At the time of publication, the MITRE ATT&CK framework identified some 236 hacking techniques across 14 different categories. Luckily, you don’t need to understand all these tactics to stay safe. Many are close variations of the same basic approach. The best cybersecurity tools…
-
Protecting AI Infrastructures | Introducing SentinelOne’s AI Security Posture Management (AI-SPM)
SentinelOne’s new AI Security Posture Management (AI-SPM) solution helps organizations secure their AI workloads effectively. The widespread adoption of AI introduces unique security considerations. Misconfigurations in AI infrastructure and unsecured APIs can create weaknesses that cybercriminals will exploit. In this blog post, we dive deep into how SentinelOne’s agentless AI Security Posture Management (AI-SPM) solution…
-
S Ventures Invests in poolside, Next Generation AI for Software Engineering
S Ventures invests in poolside, one of the most watched and highest valued startups in generative AI for software engineering today. In October 2024, SentinelOne’s venture arm, S Ventures, made a strategic investment in poolside as part of the AI assistive coding startup’s $500 million Series B round. It was one of S Ventures notable…