Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Build Custom, High-Impact Training with KnowBe4's Content Creation Agent

In the world of security awareness training, a comprehensive library of relevant and engaging content is a necessity. But even the best training can feel limited when you need to talk about your specific VPN rules, a policy that changed this morning, or a novel threat uniquely targeting your industry today. When you need exactly the right training at the right time customized to your organization, what do you do?

[Heads Up] GitHub Breach Shows Developer Tools Are Social Engineering Targets

GitHub disclosed that attackers accessed its internal repositories after compromising an employee device through a poisoned Visual Studio Code extension. The company said the activity appears limited to GitHub-owned internal repositories, with the attacker’s claim of roughly 3,800 repositories being “directionally consistent” with its investigation. GitHub also said it found no evidence that customers’ own enterprises, organizations or repositories were impacted.

15 Best Zero Trust Network Security Tools [By Category]

Trust is expensive. The wrong zero trust network security tool can leave you with more standing access and more risk than you started with. In today’s modern and complex environments, this sentiment matters more than ever. 22% of breaches involved credential abuse as the initial access vector. In this guide, we break down the best zero trust network security tools by category, helping you choose the optimal solution for your requirements.

10 DevSecOps Vulnerabilities That Can Compromise Your CI/CD Pipeline

The shift-left approach and prioritizing security from the very beginning of the coding process are what the tech industry talks endlessly about. Yet, many DevOps teams falsely believe that simply scanning code makes them secure. The harsh reality is that your CI/CD pipeline is rarely guarded with the same level of rigor and monitoring as the production environment it serves.

MDR Isn't a Silver Bullet for Poor Telemetry

Managed Detection and Response (MDR) has become a critical capability for organizations navigating increasingly sophisticated cyber threats, expanding attack surfaces, and growing operational complexity. But despite significant investments in MDR services, many organizations still struggle with delayed investigations, missed detections, and inconsistent visibility across their environments. The issue is often not the MDR provider itself. It is the telemetry.

What Is Trust Now, Forge Later (TNFL)? TNFL vs HNDL Attacks Explained

Suppose that the hospital allows a vital software update of its infusion pumps to go through, and all security tests pass. The signature looks valid. The certificate is scrapless. Everything appears legitimate. The update was forged by an attacker who cracked a key that was considered unbreakable just five years ago. The general perception of most individuals is that after encryption or after data is digitally signed, it stays secure indefinitely. That assumption is now perilously outdated.

CISA's GitHub Leak Is a Preview of the MCP Security Problem Every CISO Is About to Inherit

America's cybersecurity agency left its production credentials sitting in a public GitHub repo for six months. The same failure pattern is now being automated by AI agents in every enterprise running Cursor, Claude Desktop, or Copilot.

After the migration: securing and optimizing Tines Cases

With your data migrated and your team settled into Tines Cases, the final phase is making the most of your new case management platform. This is the final part of our series on migrating to Tines Cases and will cover securing the migration infrastructure, cleaning up technical debt that every migration leaves behind, and tuning your environment so it keeps getting better over time.

The operational side of migrating to Tines Cases: communication, rollback, and compliance

Once your migration plan to Tines Cases is in place, the next priority is ensuring the transition sticks. This is part three of our series on migrating to Tines Cases and will cover the operational side of migration: communicating the changes to your team, running a smooth parallel period, planning for rollback if needed, and ensuring reporting and compliance don’t miss a beat. These are the steps that turn a successful technical migration into a successful adoption.

Laying the groundwork for your migration to Tines Cases

Migrating from your previous ticketing platform to Tines Cases is a straightforward project when you break it into manageable steps. This is part two of our Tines Cases guide and walks through those steps and provides practical advice on how to avoid common pitfalls, keep your migration on schedule, and end up with a well-structured Cases environment from day one.