SentinelOne DE Just another SentinelOne Sites
Cybersecurity Blog | SentinelOne Next Generation Endpoint Security
- The AI Inflection Point | How Agentic & GenAI Are Reshaping Security Operationsby Arijeet Ghatak on April 11, 2025 at 12:00 pm
Read how security teams are adopting agentic and generative AI to reshape operations and accelerate the journey toward an autonomous SOC.
- Re-Assessing Risk | Subdomain Takeovers As Supply Chain Attacksby Chris Hosking on April 10, 2025 at 10:45 pm
Learn how a minor DNS misconfiguration can quickly become a major supply chain threat and how to protect your organization from such threats.
- An Official Statement in Response to the April 9, 2025 Executive Orderby SentinelOne on April 10, 2025 at 4:09 am
Read SentinelOne’s response to President Donald Trump’s Executive Order dated April 9, 2025 here.
- IngressNightmare | Critical Unauthenticated RCE Vulnerabilities in Kubernetes Ingress NGINXby SentinelOne on April 4, 2025 at 6:19 pm
We share actionable mitigation and detection strategies against IngressNightmare so you can protect against possible exploitation in runtime.
- Cyber Threats & SMBs | Chubb & SentinelOne Expedite Access to Cyber Insuranceby Barnaby Page & Craig Giuliano on April 3, 2025 at 1:00 pm
Today’s SMBs face various cyber threats and risks. Learn how our partnership with Chubb helps you qualify and get quotes for cyber insurance.
- The Overlooked Six | AWS Security Blind Spotsby Don Magee on April 2, 2025 at 1:00 pm
In this guest blog post, learn about six commonly missed AWS ‘blind spots’ that could lead to risk in your cloud infrastructure.
- GPU Device Plugins | Unveiling Risks in Kubernetes Workloadsby Yehonatan Bitton & Shaul Ben Hai on March 27, 2025 at 7:49 pm
Learn how to secure and leverage the full performance benefits of GPUs by mitigating undue risks in Kubernetes and GPU device plugins.
- ReaderUpdate Reforged | Melting Pot of macOS Malware Adds Go to Crystal, Nim and Rust Variantsby Phil Stokes & Raffaele Sabato on March 25, 2025 at 4:40 pm
A widespread campaign with binaries written in different source languages, ReaderUpdate presents unique challenges for detection and analysis.
- When Python Is Poisoned | How Runtime Security Stops the tj-actions Attackby Yehonatan Bitton & Shaul Ben Hai on March 21, 2025 at 12:00 pm
Read SentinelOne’s response to the tj-actions/changed-files attack and learn how to secure development pipelines with runtime security.
- How to Build and Maintain an Effective AWS Security Postureby Aidan Steele on March 20, 2025 at 4:27 pm
In this guest blog post, learn the basics on how to build and maintain an effective AWS security posture leveraging various best practices.