Resource Center
Stay up to date with the latest cybersecurity content and insights
Latest Resources
SentinelLabs Workshop: Cloud Threat Hunting
Enhance and stay sharp on your cloud security skills in our upcoming free virtual workshop with SentinelLabs. This is a hands-on, virtual workshop where you will gain practical skills in cloud security. The workshop will cover cloud malware techniques, script-based attacks, and common API abuse tactics often used for spamming, propagation, and persistence. Alex Delamotte, […]
[SAARC] Cloud Attack & Defend: Emerging Threats
In this session, SentinelOne researchers will share their latest findings on real-world threats. Discover the tactics, techniques, and procedures (TTPs) used by adversaries, and gain actionable strategies to fortify your defenses. Key takeaways: Understanding of current threats targeting cloud and AI systems Insights into adversarial techniques identified through frontline research Practical guidance on enhancing security […]
[ANZ] Cloud Attack & Defend: Emerging Threats
In this session, SentinelOne researchers will share their latest findings on real-world threats. Discover the tactics, techniques, and procedures (TTPs) used by adversaries, and gain actionable strategies to fortify your defenses. Key takeaways: Understanding of current threats targeting cloud and AI systems Insights into adversarial techniques identified through frontline research Practical guidance on enhancing security […]
[EMEA] Cloud Attack & Defend: Emerging Threats
In this session, SentinelOne researchers will share their latest findings on real-world threats. Discover the tactics, techniques, and procedures (TTPs) used by adversaries, and gain actionable strategies to fortify your defenses. Key takeaways: Understanding of current threats targeting cloud and AI systems Insights into adversarial techniques identified through frontline research Practical guidance on enhancing security […]
[SAARC] Streamlined Automations for Cloud Security
SentinelOne Singularity Hyperautomation operationalizes cloud security by using no-code workflows to automate fixes for cloud misconfigurations and issue tracking for developers. In this webinar, we will showcase how Hyperautomation empowers cloud security analysts to efficiently reduce their security debt by: Correcting cloud misconfigurations using out-of-the-box templates or custom workflows Ensuring adequate cloud identity permissions Integrating within […]
[ANZ] Streamlined Automations for Cloud Security
SentinelOne Singularity Hyperautomation operationalizes cloud security by using no-code workflows to automate fixes for cloud misconfigurations and issue tracking for developers. In this webinar, we will showcase how Hyperautomation empowers cloud security analysts to efficiently reduce their security debt by: Correcting cloud misconfigurations using out-of-the-box templates or custom workflows Ensuring adequate cloud identity permissions Integrating within […]
[EMEA] Streamlined Automations for Cloud Security
SentinelOne Singularity Hyperautomation operationalizes cloud security by using no-code workflows to automate fixes for cloud misconfigurations and issue tracking for developers. In this webinar, we will showcase how Hyperautomation empowers cloud security analysts to efficiently reduce their security debt by: Correcting cloud misconfigurations using out-of-the-box templates or custom workflows Ensuring adequate cloud identity permissions Integrating within […]
Unlock the Full Potential of Your Security Data: AI SIEM + Purple AI
Our webinar series “Can Your SIEM Do That” highlights how existing SentinelOne customers are leveraging Purple AI and Hyperautomation to dramatically enhance their security posture and operational efficiency. You will learn how this cutting-edge approach can help you: Unlock the full potential of your security data, while also reducing the cost Eliminate bottlenecks and slash […]
Cloud Attack and Defend: Emerging Threats
In this session, SentinelOne researchers will share their latest findings on real-world threats. Discover the tactics, techniques, and procedures (TTPs) used by adversaries, and gain actionable strategies to fortify your defenses. Key takeaways: Understanding of current threats targeting cloud and AI systems Insights into adversarial techniques identified through frontline research Practical guidance on enhancing security posture […]