Security Operations

SCCM: Enterprise Backbone or Attack Vector? Part 2

SCCM: Enterprise Backbone or Attack Vector? Part 2

Learn how attackers exploit Microsoft SCCM infrastructure through LDAP, WMI enumeration & detection strategies to secure enterprise environments.
Sep 17, 2025
SCCM: Enterprise Backbone or Attack Vector?

SCCM: Enterprise Backbone or Attack Vector?

Learn how attackers exploit Microsoft SCCM infrastructure through LDAP, WMI enumeration & detection strategies to secure enterprise environments.
Sep 16, 2025
Palo Alto Networks and MITRE ATT&CK® Evaluations: Enterprise 2025

Palo Alto Networks and MITRE ATT&CK® Evaluations: Enterprise 2025

To further accelerate innovation for our customers, Palo Alto Networks will not participate in the 2025 MITRE ATT&CK® Evaluations after two years of leading results.
Sep 12, 2025
Why Integrated File Integrity Monitoring Matters for Elevating Your Security

Why Integrated File Integrity Monitoring Matters for Elevating Your Securit...

Strengthen security & compliance with integrated File Integrity Monitoring (FIM). Learn how Cortex FIM provides real-time detection of unauthorized ch...
Aug 12, 2025

Subscribe to Security Operations Blogs!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.