top of page
Suspicious Activity?
Technology Blog
Technology Blog explores the latest advances in cybersecurity tools and industry news. We share practical insights and real world examples that help security teams strengthen defenses and stay ahead of emerging risks.
![[Gartner SRM Summit 2025] The Value and Adoption Strategy of Threat Led Penetration Testing](https://static.wixstatic.com/media/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.webp)
![[Gartner SRM Summit 2025] The Value and Adoption Strategy of Threat Led Penetration Testing](https://static.wixstatic.com/media/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_1c0eb4ceecc8493d8326709574cbca7c~mv2.webp)
[Gartner SRM Summit 2025] The Value and Adoption Strategy of Threat Led Penetration Testing
Eric Ahlm’s session , “Tips for Improving Your Security Operations With Adversarial Exposure Validation,” underscored AEV as the heart of...

Pyo Kwon
Jun 12, 20252 min read
![[Gartner SRM Summit 2025] Demonstrating the CTEM Framework with Adversarial Exposure Validation](https://static.wixstatic.com/media/374e53_f409b05165d94f29af0031da1559972c~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_f409b05165d94f29af0031da1559972c~mv2.webp)
![[Gartner SRM Summit 2025] Demonstrating the CTEM Framework with Adversarial Exposure Validation](https://static.wixstatic.com/media/374e53_f409b05165d94f29af0031da1559972c~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_f409b05165d94f29af0031da1559972c~mv2.webp)
[Gartner SRM Summit 2025] Demonstrating the CTEM Framework with Adversarial Exposure Validation
In 2023 and 2024 the Gartner SRM Summit focused on ASM (Attack Surface Management) and CTEM (Continuous Threat Exposure Management)...

Pyo Kwon
Jun 12, 20253 min read
![[Gartner SRM Summit 2025] Opening Keynote](https://static.wixstatic.com/media/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.webp)
![[Gartner SRM Summit 2025] Opening Keynote](https://static.wixstatic.com/media/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_fcc9e91512374d79805c1d4f09fe2e90~mv2.webp)
[Gartner SRM Summit 2025] Opening Keynote
Jun 9-11, 2025 | National Harbor, MD Speakers Leigh McMullen (Gartner Distinguished VP Analyst) Katell Thielemann (Gartner Distinguished...

Paul Kwon
Jun 12, 20253 min read
![[Gartner SRM Summit 2025] Conference Overview](https://static.wixstatic.com/media/374e53_49e89d634de747febcbd760a3e3a7781~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_49e89d634de747febcbd760a3e3a7781~mv2.webp)
![[Gartner SRM Summit 2025] Conference Overview](https://static.wixstatic.com/media/374e53_49e89d634de747febcbd760a3e3a7781~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_49e89d634de747febcbd760a3e3a7781~mv2.webp)
[Gartner SRM Summit 2025] Conference Overview
Jun 9-11, 2025 | National Harbor, MD Conference Overview From June 9 to 11, 2025, the Gartner Security and Risk Management Summit took...

Paul Kwon
Jun 12, 20253 min read


When Retail Giants Stumble: Lessons from Recent Attacks on Victoria’s Secret, North Face and Cartier
In early June 2025 three household names - Victoria’s Secret, North Face and Cartier - fell victim to cyberattacks that exposed customer...

PAGO Networks
Jun 8, 20252 min read


A Three-Part Reflection Series on MDR and PAGO Security Summit by SharedIT
Following the 2025 PAGO Security Summit , Jang Doohwan from SharedIT published a three-part deep-dive series unpacking how Managed...

PAGO Networks
May 29, 20251 min read


Next-Generation SOC Demands Skilled Experts: Insights from DataNet Korea
PAGO CoE (Center of Excellence) - Seoul, South Korea The evolving threat landscape and growing complexity of cybersecurity operations...

PAGO Networks
May 28, 20252 min read


Waymo and the Cybersecurity Mirror: What Autonomy Teaches Us About Digital Defense
Waymo LLC, formerly known as the Google Self-Driving Car Project One of the cool things we can notice around San Francisco is the presence of many cars circulating without a driver. Waymo, a subsidiary of Alphabet Inc., is a leader in autonomous driving technology. Its self-driving vehicles, built on the Jaguar I-PACE electric SUV platform, are designed to navigate public roads without human intervention. Waymo is not just a company building self-driving cars. It is reshaping

Juliana Hofstetter
May 7, 20253 min read
![[RSAC 2025 Sessions] Beyond the Battlefield to SOC: The Duality of Threats and Solutions](https://static.wixstatic.com/media/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.webp)
![[RSAC 2025 Sessions] Beyond the Battlefield to SOC: The Duality of Threats and Solutions](https://static.wixstatic.com/media/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_4a40f4464e13449d9fed0d7eaf54149c~mv2.webp)
[RSAC 2025 Sessions] Beyond the Battlefield to SOC: The Duality of Threats and Solutions
Day 3 of RSAC 2025 brought the spotlight to the deeper implications of AI not just as a tool, but as a force actively reshaping global...

PAGO Networks
May 2, 20253 min read
![[RSAC 2025 Sessions] How Security Companies Are Evolving](https://static.wixstatic.com/media/374e53_583697585e864124a2474dd726416819~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_583697585e864124a2474dd726416819~mv2.webp)
![[RSAC 2025 Sessions] How Security Companies Are Evolving](https://static.wixstatic.com/media/374e53_583697585e864124a2474dd726416819~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_583697585e864124a2474dd726416819~mv2.webp)
[RSAC 2025 Sessions] How Security Companies Are Evolving
On April 30, the final day of RSA Conference 2025 offered a different tone from the previous two days. While the early part of the...

PAGO Networks
May 1, 20253 min read
![[RSAC 2025] A Clear Signal on AI and the Future of Cybersecurity](https://static.wixstatic.com/media/374e53_1dd6ba6dc5034448a1d73c756a75e430~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/374e53_1dd6ba6dc5034448a1d73c756a75e430~mv2.webp)
![[RSAC 2025] A Clear Signal on AI and the Future of Cybersecurity](https://static.wixstatic.com/media/374e53_1dd6ba6dc5034448a1d73c756a75e430~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_avif,quality_auto/374e53_1dd6ba6dc5034448a1d73c756a75e430~mv2.webp)
[RSAC 2025] A Clear Signal on AI and the Future of Cybersecurity
RSAC 2025 If RSA Conference 2025 made one thing clear, it’s that AI is no longer a theoretical concept, it’s becoming central to how...

PAGO Networks
Apr 29, 20254 min read


Why Stellar Cyber Stands Out in Korea
Aimei Wei, Founder & CTO of Stellar Cyber at PAGO Security Summit 2025 In the evolving arena of cybersecurity, where governments and...

PAGO Networks
Apr 25, 20252 min read


Beyond MDR: How Preemptive Response Raises the Bar
Cybersecurity threats are becoming faster, more sophisticated, and increasingly targeted. In response, many organizations rely on Managed...

PAGO Networks
Apr 21, 20252 min read


How Medusa Ransomware Bypasses Security
The Medusa ransomware group has been actively refining its attack techniques, with recent reports revealing that it is leveraging a...

PAGO Networks
Mar 24, 20252 min read


Fortinet Exploits Fuel SuperBlack Ransomware Attacks
Between late January and early March 2025, cybersecurity researchers uncovered a series of sophisticated intrusions leveraging critical...

PAGO Networks
Mar 18, 20252 min read


Microsoft Fixes 57 Vulnerabilities, Including 6 Active Zero-Days
Microsoft Addresses New Threats and Advances Security In March 2025, Microsoft released critical security updates and made significant...

PAGO Networks
Mar 13, 20257 min read


Concern Arises Over Sophisticated North Korean Hacking Attacks
North Korea’s Growing Cyber Threat: Financial Heists and Espionage South Korea’s National Intelligence Service (NIS) has issued a stark...

PAGO Networks
Mar 5, 20252 min read


Cybercriminals Breach Genea’s Patient Data
The Need for Robust Cybersecurity Measures. Analyzing the Genea Data Breach and Its Implications for Healthcare Data Security In February...

PAGO Networks
Feb 25, 20253 min read


The Rise of AI-Driven Cyber Threats & Defenses
How AI is Changing Cybersecurity? Artificial Intelligence (AI) is revolutionizing the cybersecurity landscape, but not just for...

PAGO Networks
Feb 15, 20252 min read
Subscribe to the PAGO Newsletter
bottom of page
