top of page
Suspicious Activity?
Technology Blog
Technology Blog explores the latest advances in cybersecurity tools and industry news. We share practical insights and real world examples that help security teams strengthen defenses and stay ahead of emerging risks.


When SentinelOne detects a threat, PAGO responds immediately.
Where technology meets execution, that is what defines PAGO MDR . Even the most advanced tools are not enough if there is no partner who...

PAGO Networks
Jun 30, 20253 min read


300% Surge in AI Driven Tax Scams Reported in Australia
Trust in digital communications has become more fragile than ever. In recent weeks Australian authorities have sounded the alarm on a...

PAGO Networks
Jun 19, 20252 min read
![[Gartner SRM Summit 2025] Minimizing Threat Exposure through Security Management Optimization with CTEM and ASCA](https://static.wixstatic.com/media/374e53_d66bb691cca84d6d8d0ca80bbfc77a3a~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_d66bb691cca84d6d8d0ca80bbfc77a3a~mv2.webp)
![[Gartner SRM Summit 2025] Minimizing Threat Exposure through Security Management Optimization with CTEM and ASCA](https://static.wixstatic.com/media/374e53_d66bb691cca84d6d8d0ca80bbfc77a3a~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_d66bb691cca84d6d8d0ca80bbfc77a3a~mv2.webp)
[Gartner SRM Summit 2025] Minimizing Threat Exposure through Security Management Optimization with CTEM and ASCA
The Racecar Illusion: Focus on Reliable Fundamentals, Not the Flashiest Gear Chris Silva, VP Analyst at Gartner, likened our obsession...

Kenneth Nam
Jun 15, 20252 min read
![[Gartner SRM Summit 2025] Cyber Deterrence Strategy](https://static.wixstatic.com/media/374e53_a32f0fe0e7334f84a1c9df305474c3e4~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_a32f0fe0e7334f84a1c9df305474c3e4~mv2.webp)
![[Gartner SRM Summit 2025] Cyber Deterrence Strategy](https://static.wixstatic.com/media/374e53_a32f0fe0e7334f84a1c9df305474c3e4~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_a32f0fe0e7334f84a1c9df305474c3e4~mv2.webp)
[Gartner SRM Summit 2025] Cyber Deterrence Strategy
The session on stopping attacks before they even begin, known as Cyber Deterrence , was one of the most thought-provoking at Gartner SRM...

Paul Kwon
Jun 15, 20256 min read
![[Gartner SRM Summit 2025] 4 Key Trends and Survival Strategies for Security Operations](https://static.wixstatic.com/media/374e53_e378d2f6fb2f491f9252d2d0a9108899~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_e378d2f6fb2f491f9252d2d0a9108899~mv2.webp)
![[Gartner SRM Summit 2025] 4 Key Trends and Survival Strategies for Security Operations](https://static.wixstatic.com/media/374e53_e378d2f6fb2f491f9252d2d0a9108899~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_e378d2f6fb2f491f9252d2d0a9108899~mv2.webp)
[Gartner SRM Summit 2025] 4 Key Trends and Survival Strategies for Security Operations
How will the cyber-security landscape change by 2025? In his “Outlook for Security Operations 2025” presentation, Gartner’s Eric Ahlm...

Pyo Kwon
Jun 15, 20255 min read
![[Gartner SRM Summit 2025] A Realistic Roadmap to an AI-Driven Autonomous SOC](https://static.wixstatic.com/media/374e53_35eb62b0cbdf47a4a0143bdeec5248fe~mv2.jpg/v1/fill/w_333,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/374e53_35eb62b0cbdf47a4a0143bdeec5248fe~mv2.webp)
![[Gartner SRM Summit 2025] A Realistic Roadmap to an AI-Driven Autonomous SOC](https://static.wixstatic.com/media/374e53_35eb62b0cbdf47a4a0143bdeec5248fe~mv2.jpg/v1/fill/w_305,h_229,fp_0.50_0.50,q_90,enc_avif,quality_auto/374e53_35eb62b0cbdf47a4a0143bdeec5248fe~mv2.webp)
[Gartner SRM Summit 2025] A Realistic Roadmap to an AI-Driven Autonomous SOC
The session “AI-Enhanced SOC: Bridging the Gap to Advanced Automation in 2025,” presented by Kevin Schmidt, was compelling because it...

Pyo Kwon
Jun 15, 20254 min read
![[Gartner SRM Summit 2025] Future of Security: Generative AI, a Double-Edged Sword of Opportunity and Threat](https://static.wixstatic.com/media/374e53_38c1cc81c9544f11a524e963c94e7ae5~mv2.jpg/v1/fill/w_333,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/374e53_38c1cc81c9544f11a524e963c94e7ae5~mv2.webp)
![[Gartner SRM Summit 2025] Future of Security: Generative AI, a Double-Edged Sword of Opportunity and Threat](https://static.wixstatic.com/media/374e53_38c1cc81c9544f11a524e963c94e7ae5~mv2.jpg/v1/fill/w_305,h_229,fp_0.50_0.50,q_90,enc_avif,quality_auto/374e53_38c1cc81c9544f11a524e963c94e7ae5~mv2.webp)
[Gartner SRM Summit 2025] Future of Security: Generative AI, a Double-Edged Sword of Opportunity and Threat
Generative AI: Innovation and Risk Shaping Security’s Future Generative AI (Gen AI) is rapidly gaining traction in security. About 16% of...

Kenneth Nam
Jun 14, 20255 min read
![[Gartner SRM Summit 2025] Gartner’s Cybersecurity Tool Optimization Strategy: From Overload to Efficiency](https://static.wixstatic.com/media/374e53_e0176a65f8214259be5ef72b110ba532~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_e0176a65f8214259be5ef72b110ba532~mv2.webp)
![[Gartner SRM Summit 2025] Gartner’s Cybersecurity Tool Optimization Strategy: From Overload to Efficiency](https://static.wixstatic.com/media/374e53_e0176a65f8214259be5ef72b110ba532~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_e0176a65f8214259be5ef72b110ba532~mv2.webp)
[Gartner SRM Summit 2025] Gartner’s Cybersecurity Tool Optimization Strategy: From Overload to Efficiency
Efficient Tool Optimization Strategies in a Complex Cybersecurity Landscape The cybersecurity landscape often feels like a blizzard of...

Kenneth Nam
Jun 13, 20254 min read
![[Gartner SRM Summit 2025] Outlook for Identity and Access Management (IAM)](https://static.wixstatic.com/media/374e53_b870c5de561d4707be9b46cc8dc27f46~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_b870c5de561d4707be9b46cc8dc27f46~mv2.webp)
![[Gartner SRM Summit 2025] Outlook for Identity and Access Management (IAM)](https://static.wixstatic.com/media/374e53_b870c5de561d4707be9b46cc8dc27f46~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_b870c5de561d4707be9b46cc8dc27f46~mv2.webp)
[Gartner SRM Summit 2025] Outlook for Identity and Access Management (IAM)
On Day 2 of the Gartner Security and Risk Management Summit 2025, Akif Khan highlighted Identity and Access Management as the backbone of...

Pyo Kwon
Jun 13, 20255 min read
![[Gartner SRM Summit 2025] Managed Detection and Response Market Guide](https://static.wixstatic.com/media/374e53_8f9415d5a64d455bbf36108d1415a6d7~mv2.jpg/v1/fill/w_333,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/374e53_8f9415d5a64d455bbf36108d1415a6d7~mv2.webp)
![[Gartner SRM Summit 2025] Managed Detection and Response Market Guide](https://static.wixstatic.com/media/374e53_8f9415d5a64d455bbf36108d1415a6d7~mv2.jpg/v1/fill/w_305,h_229,fp_0.50_0.50,q_90,enc_avif,quality_auto/374e53_8f9415d5a64d455bbf36108d1415a6d7~mv2.webp)
[Gartner SRM Summit 2025] Managed Detection and Response Market Guide
Pete Shoard Gartner VP Analyst Gartner Guide Insight: From Buying Security to Driving Operational Efficiency Pete Shoard, a Gartner Vice...

Kenneth Nam
Jun 12, 20252 min read
![[Gartner SRM Summit 2025] A Practical Guide to Choosing the Right SOC for Midsize Enterprises](https://static.wixstatic.com/media/374e53_3a90a831f3d04a8ea9e934512316c499~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_3a90a831f3d04a8ea9e934512316c499~mv2.webp)
![[Gartner SRM Summit 2025] A Practical Guide to Choosing the Right SOC for Midsize Enterprises](https://static.wixstatic.com/media/374e53_3a90a831f3d04a8ea9e934512316c499~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_3a90a831f3d04a8ea9e934512316c499~mv2.webp)
[Gartner SRM Summit 2025] A Practical Guide to Choosing the Right SOC for Midsize Enterprises
Patrick Long Gartner Analyst Why SOC Service Models Matter Patrick Long, a Gartner distinguished analyst, opened his session by stressing...

Kenneth Nam
Jun 12, 20253 min read
![[Gartner SRM Summit 2025] The Value and Adoption Strategy of Threat Led Penetration Testing](https://static.wixstatic.com/media/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.webp)
![[Gartner SRM Summit 2025] The Value and Adoption Strategy of Threat Led Penetration Testing](https://static.wixstatic.com/media/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.webp)
[Gartner SRM Summit 2025] The Value and Adoption Strategy of Threat Led Penetration Testing
Eric Ahlm’s session , “Tips for Improving Your Security Operations With Adversarial Exposure Validation,” underscored AEV as the heart of...

Pyo Kwon
Jun 12, 20252 min read
![[Gartner SRM Summit 2025] Demonstrating the CTEM Framework with Adversarial Exposure Validation](https://static.wixstatic.com/media/374e53_f409b05165d94f29af0031da1559972c~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_f409b05165d94f29af0031da1559972c~mv2.webp)
![[Gartner SRM Summit 2025] Demonstrating the CTEM Framework with Adversarial Exposure Validation](https://static.wixstatic.com/media/374e53_f409b05165d94f29af0031da1559972c~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_f409b05165d94f29af0031da1559972c~mv2.webp)
[Gartner SRM Summit 2025] Demonstrating the CTEM Framework with Adversarial Exposure Validation
In 2023 and 2024 the Gartner SRM Summit focused on ASM (Attack Surface Management) and CTEM (Continuous Threat Exposure Management)...

Pyo Kwon
Jun 12, 20253 min read
![[Gartner SRM Summit 2025] Opening Keynote](https://static.wixstatic.com/media/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.webp)
![[Gartner SRM Summit 2025] Opening Keynote](https://static.wixstatic.com/media/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.webp)
[Gartner SRM Summit 2025] Opening Keynote
Jun 9-11, 2025 | National Harbor, MD Speakers Leigh McMullen (Gartner Distinguished VP Analyst) Katell Thielemann (Gartner Distinguished...

Paul Kwon
Jun 12, 20253 min read
![[Gartner SRM Summit 2025] Conference Overview](https://static.wixstatic.com/media/374e53_49e89d634de747febcbd760a3e3a7781~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_49e89d634de747febcbd760a3e3a7781~mv2.webp)
![[Gartner SRM Summit 2025] Conference Overview](https://static.wixstatic.com/media/374e53_49e89d634de747febcbd760a3e3a7781~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_49e89d634de747febcbd760a3e3a7781~mv2.webp)
[Gartner SRM Summit 2025] Conference Overview
Jun 9-11, 2025 | National Harbor, MD Conference Overview From June 9 to 11, 2025, the Gartner Security and Risk Management Summit took...

Paul Kwon
Jun 12, 20253 min read


When Retail Giants Stumble: Lessons from Recent Attacks on Victoria’s Secret, North Face and Cartier
In early June 2025 three household names - Victoria’s Secret, North Face and Cartier - fell victim to cyberattacks that exposed customer...

PAGO Networks
Jun 8, 20252 min read


A Three-Part Reflection Series on MDR and PAGO Security Summit by SharedIT
Following the 2025 PAGO Security Summit , Jang Doohwan from SharedIT published a three-part deep-dive series unpacking how Managed...

PAGO Networks
May 29, 20251 min read


Next-Generation SOC Demands Skilled Experts: Insights from DataNet Korea
PAGO CoE (Center of Excellence) - Seoul, South Korea The evolving threat landscape and growing complexity of cybersecurity operations...

PAGO Networks
May 28, 20252 min read


Waymo and the Cybersecurity Mirror: What Autonomy Teaches Us About Digital Defense
Waymo LLC, formerly known as the Google Self-Driving Car Project One of the cool things we can notice around San Francisco is the presence of many cars circulating without a driver. Waymo, a subsidiary of Alphabet Inc., is a leader in autonomous driving technology. Its self-driving vehicles, built on the Jaguar I-PACE electric SUV platform, are designed to navigate public roads without human intervention. Waymo is not just a company building self-driving cars. It is reshaping

Juliana Hofstetter
May 7, 20253 min read
![[RSAC 2025 Sessions] Beyond the Battlefield to SOC: The Duality of Threats and Solutions](https://static.wixstatic.com/media/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.webp)
![[RSAC 2025 Sessions] Beyond the Battlefield to SOC: The Duality of Threats and Solutions](https://static.wixstatic.com/media/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.webp)
[RSAC 2025 Sessions] Beyond the Battlefield to SOC: The Duality of Threats and Solutions
Day 3 of RSAC 2025 brought the spotlight to the deeper implications of AI not just as a tool, but as a force actively reshaping global...

PAGO Networks
May 2, 20253 min read
Subscribe to the PAGO Newsletter
bottom of page
