Sean DoggettOct 7, 20221 min readVideo: Threat Hunting and Incident Response with SentinelOne Part 2Watch Part 2 of our Threat Hunting and Incident Response with SentinelOne Series. In this Video, Cyber Vigilance's Cyber Security...
Sean DoggettSep 26, 20221 min readVideo: Threat Hunting and Incident Response with SentinelOne Part 1Watch Part 1 of our Threat Hunting and Incident Response with SentinelOne Series. In this Video, Cyber Vigilance's Cyber Security...
Sean DoggettMar 23, 20206 min readSentinelOne - True Context True Context is heralded as a gem in SentinelOne’s crown. It minimises the dwell time by neatly linking the attack chain together,...
Sean DoggettMar 10, 20205 min readSentinelOne - How does Rollback Work?Rollback, SentinelOne's rewind for ransomware. This feature boasts the ability to restore, with a single click, files that have been...
Sean DoggettFeb 18, 20202 min readKill, Quarantine, Remediate and Rollback - SentinelOneUncovering the difference between SentinelOne's Kill, Quarantine, Remediate and Rollback actions.
Sean DoggettJan 9, 20203 min readWhat is the difference between SentinelOne Core, Control and Complete?The Singularity Platform is an Edge to Edge Enterprise Security Platform. "One platform to prevent, detect, respond, and hunt in the...
Sean DoggettOct 10, 20198 min readBlueKeep and SentinelOneWhen I set out to write this blog, the aim was to make use of a publicly available exploit in order to benchmark SentinelOne.