SentinelOne Acquires Attivo Networks, Bringing Identity to XDR Learn More
SentinelOne Acquires Attivo Networks, Bringing Identity to XDR
Experiencing a Breach?
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
Get a Demo
  • Platform
    The SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats.
    XDR Platform Overview
    Platform Packages
    SentinelOne for Zero Trust
    • Platform Packages
      • SingularitySingularity CompleteThe Future's Enterprise Security Platform
      • SingularitySingularity ControlSecurity with Suite Features
      • SingularitySingularity CoreCloud-Native NGAV
    • Platform Products
      • SingularitySingularity CloudContainer & Cloud
        Workload Security
      • SingularitySingularity IdentityIdentity Security
      • SentinelOneSentinelOne DataScalable Data Management
      • SingularitySingularity MobileMobile Threat Defense
      • SingularitySingularity RangerNetwork Visibility & Control
      • SingularitySingularity Ranger ADActive Directory Security
      • SingularitySingularity HologramAdversary Deception
      • SingularitySingularity XDR Power ToolsAdvanced XDR tools
  • Why SentinelOne?

    Why SentinelOne?

    SentinelOne is autonomous cybersecurity built for what’s next.

    Why SentinelOne
    Get a Demo
    • Why SentinelOne?
      • Our CustomersOur Customers Trusted by Leading Enterprises Around the Globe
      • About UsAbout Us The Industry Leader in Autonomous Cybersecurity
      • Industry RecognitionIndustry Recognition Tested & Proven
    • Compare SentinelOne
      • Vs CrowdStrike
      • Vs Microsoft Defender EPP+EDR
      • Vs Microsoft Defender XDR
      • Vs McAfee
      • Vs Symantec
      • Vs Carbon Black
      • Vs Palo Alto
      • Vs Trend Micro
    • Verticals
      • Energy
      • Federal Government
      • Finance
      • Healthcare
      • Higher Education
      • K-12 Education
      • Manufacturing
      • Retail
  • Services

    Global Services

    Augment leading technology with trusted expertise, and get set up for success with hands-on support and training.
    Services Overview
    Get Help Now
    • Threat Services
      • Vigilance Respond ProVigilance Respond Pro MDR + DFIR24x7 MDR with Full-Scale
        Investigation & Response
      • Vigilance RespondVigilance Respond MDRDedicated SOC
        Expertise & Analysis
      • WatchTower ProWatchTower Pro Threat HuntingDedicated Threat Hunting
        & Compromise Assessment
      • WatchTowerWatchTower Threat HuntingHunting for Active Campaigns
        & Emerging Threats
    • Support, Deployment, & Health
      • SentinelOne GOSentinelOne GO Guided Onboarding
        & Deployment Advisory
      • Support ServicesSupport Services Tiered Support Options
        for Every Organisation
      • Technical Account ManagementTechnical Account Management Customer Success with
        Personalised Service
      • SentinelOne UniversitySentinelOne University Live & On-Demand Training
  • Partners

    Partner Program

    See how SentinelOne works with trusted names worldwide to enhance programs, process, and technology.
    Program Overview
    • OUR NETWORK
      • Singularity MarketplaceSingularity Marketplace Extend the Power of S1 Technology
      • Technology AlliancesTechnology Alliances See Integrated, Enterprise-Scale Solutions
      • Channel PartnersChannel Partners Deliver the Right Solutions. Together
      • Cyber Risk PartnersCyber Risk Partners Enlist Pro Response & Advisory Terms
      • SentinelOne for AWSSentinelOne for AWS SentinelOne hosted in AWS
        regions around the world.
  • Resources

    Resources

    Your go-to source for the latest SentinelOne digital content, from webinars to white papers, and everything in between.
    Resource Center
    • Resource Center
      • Case Studies
      • Data Sheets
      • eBooks
      • Reports
      • Videos
      • Webinars
      • White Papers
    • Blog
      • Company
      • Cyber Response
      • Data Platform
      • Feature Spotlight
      • For CISO/CIO
      • From the Front Lines
      • Identity
      • Integrations & Partners
      • macOS
      • Podcasts
      • The Good, the Bad and the Ugly
    • Tech Resources
      • Sentinel 101
      • SentinelLabs
  • Company

    Company

    Here you will find all things SentinelOne. See how SentinelOne is redefining cybersecurity by pushing the boundariesof autonomous technology.

    • About SentinelOne
      • About SentinelOneAbout SentinelOne The Industry Leader
        in Cybersecurity
      • CareersCareers The Latest Job Opportunities
      • F1 RacingF1 Racing SentinelOne &
        Aston Martin F1 Team
      • Investor RelationsInvestor Relations Financial Information
        & Events
      • NewsNews Media Coverage & More
      • PressPress Company Announcements
      • FAQFAQ Get Answers to Our Most
        Frequently Asked Questions
      • BrandBrand SentinelOne Brand Guidelines
      • LabsLabs Threat Research for the
        Modern Threat Hunter
      • Cybersecurity BlogCybersecurity Blog The Latest Cybersecurity Threats, News, & More
      • DataSetDataSet The Live Data Platform
Back
  • Platform
    The SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats.
    XDR Platform Overview
    Platform Packages
    SentinelOne for Zero Trust
    • Platform Packages
      • SingularitySingularity CompleteThe Future's Enterprise Security Platform
      • SingularitySingularity ControlSecurity with Suite Features
      • SingularitySingularity CoreCloud-Native NGAV
    • Platform Products
      • SingularitySingularity CloudContainer & Cloud
        Workload Security
      • SingularitySingularity IdentityIdentity Security
      • SentinelOneSentinelOne DataScalable Data Management
      • SingularitySingularity MobileMobile Threat Defense
      • SingularitySingularity RangerNetwork Visibility & Control
      • SingularitySingularity Ranger ADActive Directory Security
      • SingularitySingularity HologramAdversary Deception
      • SingularitySingularity XDR Power ToolsAdvanced XDR tools
  • Why SentinelOne?

    Why SentinelOne?

    SentinelOne is autonomous cybersecurity built for what’s next.

    Why SentinelOne
    Get a Demo
    • Why SentinelOne?
      • Our CustomersOur Customers Trusted by Leading Enterprises Around the Globe
      • About UsAbout Us The Industry Leader in Autonomous Cybersecurity
      • Industry RecognitionIndustry Recognition Tested & Proven
    • Compare SentinelOne
      • Vs CrowdStrike
      • Vs Microsoft Defender EPP+EDR
      • Vs Microsoft Defender XDR
      • Vs McAfee
      • Vs Symantec
      • Vs Carbon Black
      • Vs Palo Alto
      • Vs Trend Micro
    • Verticals
      • Energy
      • Federal Government
      • Finance
      • Healthcare
      • Higher Education
      • K-12 Education
      • Manufacturing
      • Retail
  • Services

    Global Services

    Augment leading technology with trusted expertise, and get set up for success with hands-on support and training.
    Services Overview
    Get Help Now
    • Threat Services
      • Vigilance Respond ProVigilance Respond Pro MDR + DFIR24x7 MDR with Full-Scale
        Investigation & Response
      • Vigilance RespondVigilance Respond MDRDedicated SOC
        Expertise & Analysis
      • WatchTower ProWatchTower Pro Threat HuntingDedicated Threat Hunting
        & Compromise Assessment
      • WatchTowerWatchTower Threat HuntingHunting for Active Campaigns
        & Emerging Threats
    • Support, Deployment, & Health
      • SentinelOne GOSentinelOne GO Guided Onboarding
        & Deployment Advisory
      • Support ServicesSupport Services Tiered Support Options
        for Every Organisation
      • Technical Account ManagementTechnical Account Management Customer Success with
        Personalised Service
      • SentinelOne UniversitySentinelOne University Live & On-Demand Training
  • Partners

    Partner Program

    See how SentinelOne works with trusted names worldwide to enhance programs, process, and technology.
    Program Overview
    • OUR NETWORK
      • Singularity MarketplaceSingularity Marketplace Extend the Power of S1 Technology
      • Technology AlliancesTechnology Alliances See Integrated, Enterprise-Scale Solutions
      • Channel PartnersChannel Partners Deliver the Right Solutions. Together
      • Cyber Risk PartnersCyber Risk Partners Enlist Pro Response & Advisory Terms
      • SentinelOne for AWSSentinelOne for AWS SentinelOne hosted in AWS
        regions around the world.
  • Resources

    Resources

    Your go-to source for the latest SentinelOne digital content, from webinars to white papers, and everything in between.
    Resource Center
    • Resource Center
      • Case Studies
      • Data Sheets
      • eBooks
      • Reports
      • Videos
      • Webinars
      • White Papers
    • Blog
      • Company
      • Cyber Response
      • Data Platform
      • Feature Spotlight
      • For CISO/CIO
      • From the Front Lines
      • Identity
      • Integrations & Partners
      • macOS
      • Podcasts
      • The Good, the Bad and the Ugly
    • Tech Resources
      • Sentinel 101
      • SentinelLabs
  • Company

    Company

    Here you will find all things SentinelOne. See how SentinelOne is redefining cybersecurity by pushing the boundariesof autonomous technology.

    • About SentinelOne
      • About SentinelOneAbout SentinelOne The Industry Leader
        in Cybersecurity
      • CareersCareers The Latest Job Opportunities
      • F1 RacingF1 Racing SentinelOne &
        Aston Martin F1 Team
      • Investor RelationsInvestor Relations Financial Information
        & Events
      • NewsNews Media Coverage & More
      • PressPress Company Announcements
      • FAQFAQ Get Answers to Our Most
        Frequently Asked Questions
      • BrandBrand SentinelOne Brand Guidelines
      • LabsLabs Threat Research for the
        Modern Threat Hunter
      • Cybersecurity BlogCybersecurity Blog The Latest Cybersecurity Threats, News, & More
      • DataSetDataSet The Live Data Platform
Get a Demo
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
Experiencing a Breach?

Watch conversations with real-life community leaders who are transforming the industry. You can watch live episodes here as well as past episodes. Sign up for email alerts and you'll be reminded about upcoming interviews.


See Leaders

Get Notified!

Check your inbox!

Don’t forget to visit our SentinelLabs website!

Season Three

07/01/21 @ 10:00 AM PDT

Maggie Jauregui

Firmware Security & Mastering Deep Work

Learn More
07/08/21 @ 10:00 AM PDT

Tia Hopkins

Being a Tinkerer & Staying Focused On Your North Star

Learn More
07/15/21 @ 10:00 AM PDT

Shira Cohen

Threat Hunting by Day, Opera Singer by Night

Learn More
07/22/21 @ 10:00 AM PDT

Noushin Shabab

GReAt Security Research

Learn More
07/29/21 @ 10:00 AM PDT

Alexandria San Miguel

Next Stop CISO

Learn More
08/12/21 @ 10:00 AM PDT

Noelle Murata

So You Want To Start a Security Conference

Learn More

Meet Your Host

Marco Figueroa

Marco Figueroa is a Principal Threat Researcher at SentinelLabs whose technical expertise includes reverse engineering, incident handling, threat intelligence, and APT hunting. Previously, Marco spent the last 7 years at Intel as a Sr. Security Researcher.

Maggie Jauregui

Firmware Security & Mastering Deep Work


Maggie Jauregui is an offensive security researcher at Intel’s PSG team, Maggie was a firmware security researcher for Intel's Platform Armoring and Resiliency (PAR) team that focused on UEFI security. Maggie is focused on hardware and firmware security and has presented at conferences such as DEF CON, CanSecWest, DerbyCon, OSFC, and UEFI Plugfest.

In this episode of Hack-Chat, we discuss what it takes to become a security researcher and tackling deep technical work. We also discuss how to maximize your productivity and stop procrastinating with various techniques.

Watch The Episode

Tia Hopkins

Being a Tinkerer & Staying Focused On Your North Star


Tia Hopkins is a Cybersecurity Executive that has spent the past 20+ years of her career in various IT and IT Security roles and has over a decade of experience in the managed services space. Tia holds two master's degrees in security, a bachelor's in information technology, and several industry certifications. She was recognized by SC Media as a 2019 Reboot Leadership Award recipient in the Outstanding Educator category, as well as The Software Report’s Top 25 Women Leaders in Cybersecurity and Cyber Defense Magazine’s Top 100 Women in Cybersecurity; both in 2020.

In this episode of Hack-Chat Tia discusses how she started in cybersecurity and being a practitioner and discusses her passion for teaching/mentoring.

Watch The Episode

Shira Cohen

Threat Hunting by Day, Opera Singer by Night


Shira Cohen is an experienced Cyber Security Analyst with a demonstrated history of working in the computer and network security industry as well as an Opera Singer.

In this episode of Hack-Chat, Shira explains having a passion for what you do and juggling a dual career in threat hunting and opera. She dives into how she entered cybersecurity and how she had 12 hour days of training at the beginning of her career.

Watch The Episode

Noushin Shabab

GReAt Security Research


Noushin Shabab is a senior security researcher in the Global Research & Analysis Team (GReAT). Her research focuses on investigating advanced cyber criminal activities and targeted attacks with a particular focus on local threats in the Asia Pacific region.

In this episode of Hack-Chat, we dive into how Noushin became passionate about malware while discussing how she approaches her research.

Watch The Episode

Alexandria San Miguel

Next Stop CISO


Alexandria San Miguel is a Motivator, risk-oriented information security professional, skilled in cyber & technology risk, and information security management.

In this episode of Hack-Chat Alexandria, she explains her work ethic, determination, and what it took to get to where she is today. We also discuss her pursuit to one day become a CISO in the near future.

Watch The Episode

Noelle Murata

So You Want To Start a Security Conference


Noelle Murata has held positions in network and systems administration, enterprise technical support, quality assurance, technical writing, and project/program management. Noelle has an extremely diverse background and lends her the ability to learn new things quickly and be pragmatic in context.

In this episode of Hack-Chat, we go into the importance of the Hacker community and what it really takes to start a successful Security Conference on both coasts. She reveals the current state of the conference as well as how the word of mouth spread rapidly to make it a must-attend conference.

Watch The Episode

Season One

HD Moore // The Journey of a Hacker and Entrepreneur

H. D. Moore is a network security expert, open source programmer, and hacker. He is a developer of the Metasploit Framework, the world’s most used penetration testing software suite, and the founder of the Metasploit Project. He has been referred to as “the industry’s most famous white hat hacker,” as well as an overall good dude.

In this episode of Hack Chat, we discuss what it takes to become good at hacking, and delve into his newest business venture—Rumble.

  • 43:00 HD Moore // The Journey of a Hacker and Entrepreneur

    H. D. Moore is a network security expert, open source programmer, and hacker. He is a developer of the Metasploit Framework, the world’s most used penetration testing software suite, and the founder of the Metasploit Project. He has been referred to as “the industry’s most famous white hat hacker,” as well as an overall good dude.

    In this episode of Hack Chat, we discuss what it takes to become good at hacking, and delve into his newest business venture—Rumble.

  • 59:09 JA Guerrero Saade // Hunting for APT’s

    Juan is a Cyber Paleontologist and master storyteller who has published game changing reports like Moonlight Maze, an investigation featured in the spy museum in Washington D.C.. He is formerly of GReAT, Google Chronicle, and the Co-Founder of Stairwell.

    In this episode of Hack Chat, we discuss all things APT, reports that Juan has published in the past, and what it takes to hone your craft to find threat actors.

  • 40:58 Mubix // Keep Asking Questions as a Red Teamer

    Mubix is a Red Teamer who is always looking for a challenge and willing to learn anything to overcome it. Mubix continues to push the limits of his skills, and is one of the most influential people on Twitter discussing everything Red Teaming.

    In this episode of Hack-Chat, we dive into the mindset of learning new tools of the trade and discuss how Mubix continues to elevate his skills.

  • 42:38 Chris Cochran // How To Build Threat Intelligence Programs

    Chris Cochran is a cybersecurity professional, leader, and content creator. Chris has extensive experience building and running strong cybersecurity programs and had a deep history and a passion for security operations, engineering, and leadership.

    In this episode of Hack Chat, we dig deep into the world of threat intelligence and what it takes to demonstrate value to stakeholders.

  • 57:33 Chris Nickerson // The Red Team Grind & Hustle

    Chris Nickerson is an Information Security veteran whose areas of expertise are Red Teaming and Adversarial Modeling. In order to help companies better defend and protect their critical data and key information systems, he has created a blended methodology to assess, implement, and manage information security realistically and effectively.

    In this episode of Hack Chat, we get deep into the work ethic and dedication of Red Teamers. We also discuss the Sunburst supply-chain attack, and get Chris’ perspective into the impact of this attack on Solarwinds and the industry.

  • 35:03 Ronald Eddings // SOARing

    Ronald Eddings is an expert in scaling assets and applications on-prem and in the cloud, and how this can create complexity that leads to misconfigurations and vulnerabilities. As a leader in security architecture, Ronald helps organizations scale security controls while reducing the complexities that analysts and engineers face.

    In this episode of Hack Chat, we cover the importance of DevOps automation and how corporate networks need to begin investing in SOAR.

Season Two

Stok Fredrik | Bug Bounty Hunting Like A Boss

Stok Fredrik is a bug bounty hunter recognized and awarded by: Salesforce, Microsoft, Oath/Verizonmedia, Department of Defense, HackerOne, Dell and many more. STÖK creates educational cybersecurity-related video content for the bug bounty community. Inspiring hackers to level up their BUG BOUNTY game to become better pentesters, bug hunters and redteamers. STÖK also travels the world, hacks some of the most hardened companies out there and vlogs about the bounty life.

In this episode of Hack-Chat we discuss what it takes to become a good bug bounty hunter, we also dive deep on videos he’s created as well as some of the bugs that he looks for in programs.

  • 1:08:17 Stok Fredrik | Bug Bounty Hunting Like A Boss

    Stok Fredrik is a bug bounty hunter recognized and awarded by: Salesforce, Microsoft, Oath/Verizonmedia, Department of Defense, HackerOne, Dell and many more. STÖK creates educational cybersecurity-related video content for the bug bounty community. Inspiring hackers to level up their BUG BOUNTY game to become better pentesters, bug hunters and redteamers. STÖK also travels the world, hacks some of the most hardened companies out there and vlogs about the bounty life.

    In this episode of Hack-Chat we discuss what it takes to become a good bug bounty hunter, we also dive deep on videos he’s created as well as some of the bugs that he looks for in programs.

  • 45:18 Eva Galperin | Hunting Bad Actors and Eradicating Stalkerware

    Hunting Bad Actors and Eradicating Stalkerware

    Eva Galperin is the Director of Cybersecurity at the EFF and technical advisor for the Freedom of the Press Foundation. She is noted for her extensive work in protecting global privacy and free speech and for her research on malware and nation-state spyware

    In this episode of Hack-Chat Eva discusses how she started in cyber security as well as tracking actors while pitching AV companies to alert users of security threats of stalkerware.

  • 1:01:26 Chris Gates | Positivity and Becoming a Red Team Leader

    Chris has extensive experience in network and web application penetration testing as well as other Information Operations experience working as an operator for a DoD Red Team and other Full Scope penetration testing teams (Red Teams).

    In this episode of Hack-Chat we discuss maturing as a red teamer and opportunities manifesting themselves and mental awareness while creating good energy to colleagues and friends.

  • 48:10 Runa Sandvik | Passion for Privacy & Threat Intelligence

    Runa Sandvik focuses on defense, contextual mitigations for at-risk groups, and innovative solutions for journalistic security. Her work builds upon experience from her time at The Tor Project, Freedom of the Press Foundation, The New York Times, and working closely with freelancers around the world.

    In this episode of Hack-Chat we dig deep into privacy and Runa’s passion for cyber security and drives her today.

  • 53:57 Pedram Amini | Master at Fuzzing and Bootstrapping Companies

    Security researcher, published author, founder, investor, advisor, and hacker of all things. Strong background in reverse engineering and creative problem-solving skills. I’ve presented a variety of research at security conferences such as BlackHat, DefCon, RECon, Ekoparty, Microsoft Bluehat, ShmooCon, ToorCon, Virus Bulletin; and taught numerous sold-out courses on reverse engineering.

    In this episode of Hack-Chat we dive deep into finding bugs, fuzzing and how Pedram started ZDI while also discussing how he’s bootstrapped two companies.

  • 1:39:57 Marcus Carey | Keeping it 100

    Marcus Carey is a Navy Cryptologist turned cybersecurity innovator and entrepreneur. He is currently working as an Enterprise Architect in the Office of the CTO at ReliaQuest. He is passionate about creating technology solutions that improve cybersecurity for everyone, while also focusing on creating cloud-based cybersecurity solutions that are low friction and highly effective.

    In this episode of Hack Chat, Marcus joins us to discuss the importance of being yourself, staying true to you, and the difficulties of coming from impoverished neighborhoods while still making your dreams come true through cybersecurity.

Purpose Built to Prevent Tomorrow’s Threats.

Today.

Your most sensitive data lives on the endpoint and in the cloud. Protect what matters most from cyberattacks. Fortify every edge of the network with realtime autonomous protection.
Get a demo
Company
  • Our Customers
  • Why SentinelOne
  • Platform
  • About
  • Partners
  • Support
  • Careers
  • Legal & Compliance
  • Security & Compliance
  • Contact Us
  • Investor Relations
Resources
  • Blog
  • Labs
  • Hack Chat
  • Press
  • News
  • FAQ
  • Resources
Global Headquarters

444 Castro Street
Suite 400
Mountain View, CA 94041

+1-855-868-3733

[email protected]

Sign Up For Our Newsletter
Thank you! You will now receive our weekly newsletter with all recent blog posts. See you soon!
English
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
©2022 SentinelOne, All Rights Reserved.
Privacy Policy Terms of Service