Get Free Information Around Information Security &
The Latest News in Cybersecurity Right to Your Inbox

Blog

Malicious Media | Why Your Endpoints Need Device Control

If your security solution does not manage USBs, your endpoints are beyond your control

READ MORE

Feature Spotlight – Firewall Control

Endpoint Firewall Control allows IT & security teams to manage and enforce network access policy to and from endpoints, even outside the corporate network

READ MORE

Feature Spotlight – Device Control

IT & security teams need full visibility and control over how USBs and other peripherals are used. Learn about SentinelOne’s new Device Control feature

READ MORE

How Malware Can Easily Defeat Apple’s macOS Security

or the one where we argue why your business really needs antivirus protection

READ MORE

How We Detected a Real Empire Exploit Attack

The post describes an attack that was carried out during a POC at a customer site and handled by the SentinelOne Agent and Vigilance service

READ MORE

macOS Spyware | The Dangers of a Fake CryptoWallet Keylogger

We investigate a macOS keylogger targeting Exodus cryptocurrency asset manager. Learn what to look out for and how to avoid similar spyware attacks

READ MORE

What Is Windows PowerShell (And Could It Be Malicious)?

How can PowerShell impact your business’s valuable assets? Learn the basics of PowerShell, why it’s attractive to hackers & how to protect the enterprise

READ MORE

Feature Spotlight – Behavioral Indicators and MITRE ATT&CK™ for Enterprise Support

Learn how enterprise can benefit from the integration of Behavioural Indicators and MITRE ATT&CK matrix

READ MORE

Holiday Shoppers! 5 Tips to Beat Seasonal CyberCriminals

With a sharp rise in online sales, holiday season is a busy time for internet scammers. Here’s our guide to staying safe while shopping online

READ MORE