Resource Center
Stay up to date with the latest cybersecurity content and insights
Latest Resources
Cloud Attack and Defend: Emerging Threats
In this session, SentinelOne researchers will share their latest findings on real-world threats. Discover the tactics, techniques, and procedures (TTPs) used by adversaries, and gain actionable strategies to fortify your defenses. Key takeaways: Understanding of current threats targeting cloud and AI systems Insights into adversarial techniques identified through frontline research Practical guidance on enhancing security posture […]
A New Unified Approach to Cloud Security
In this webinar, you’ll see an end-to-end live demo of our next evolution of AI-powered CNAPP: SentinelOne Singularity Cloud Security. The presentation will showcase how Singularity Cloud Security aligns DevOps, IT, and Security teams to tangibly reduce their cloud attack surface. What you’ll get: Overview of how Singularity Cloud Security reduces your attack surface and […]
AI-Powered SIEM | Unifying Operations, Hunting, and Response
Security Information and Event Management (SIEM) systems have long been the cornerstone of enterprise security, helping organizations collect, analyze, and respond to security incidents. However, traditional SIEM solutions often struggle to keep up with the sheer volume and complexity of modern cyber threats. Artificial intelligence (AI) is a transformative force that is revolutionizing the way […]
No-Code Automation for Cloud Security
SentinelOne Singularity Hyperautomation operationalizes cloud security by using no-code workflows to automate fixes for cloud misconfigurations and issue tracking for developers. In this webinar, we will showcase how Hyperautomation empowers cloud security analysts to efficiently reduce their security debt by: Correcting cloud misconfigurations using out-of-the-box templates or custom workflows Ensuring adequate cloud identity permissions Integrating […]
From Alert to Action: Enhance Endpoint Security with Automation
From automated ticketing and response to accelerated alert enrichment and investigation, Singularity Hyperautomation enhances endpoint security with a built-in, no-code automation solution to improve analyst productivity and increase efficiency. Join us to learn how combining industry-leading endpoint protection and hyperautomation can enhance the Security Operations Center. What you’ll learn in this demonstration: Practical hyperautomation use […]
SentinelLabs Workshop: Cloud Threat Hunting
Enhance and stay sharp on your cloud security skills in our upcoming free virtual workshop with SentinelLabs. This is a hands-on, virtual workshop where you will gain practical skills in cloud security. The workshop will cover cloud malware techniques, script-based attacks, and common API abuse tactics often used for spamming, propagation, and persistence. Alex Delamotte, […]
[SAARC] Cloud Attack & Defend: Emerging Threats
In this session, SentinelOne researchers will share their latest findings on real-world threats. Discover the tactics, techniques, and procedures (TTPs) used by adversaries, and gain actionable strategies to fortify your defenses. Key takeaways: Understanding of current threats targeting cloud and AI systems Insights into adversarial techniques identified through frontline research Practical guidance on enhancing security […]
[ANZ] Cloud Attack & Defend: Emerging Threats
In this session, SentinelOne researchers will share their latest findings on real-world threats. Discover the tactics, techniques, and procedures (TTPs) used by adversaries, and gain actionable strategies to fortify your defenses. Key takeaways: Understanding of current threats targeting cloud and AI systems Insights into adversarial techniques identified through frontline research Practical guidance on enhancing security […]
[EMEA] Cloud Attack & Defend: Emerging Threats
In this session, SentinelOne researchers will share their latest findings on real-world threats. Discover the tactics, techniques, and procedures (TTPs) used by adversaries, and gain actionable strategies to fortify your defenses. Key takeaways: Understanding of current threats targeting cloud and AI systems Insights into adversarial techniques identified through frontline research Practical guidance on enhancing security […]