Cato Networks

Infosec products of the month: December 2024

Infosec products of the month: December 2024 2024-12-27 at 06:03 By Help Net Security Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, Cato Networks, Datadog, Fortinet, GitGuardian, Horizon3.ai, Netwrix, Radiant Logic, RunSafe Security, SecureAuth, Stairwell, Stamus Networks, Sweet Security, Tenable, Trellix, Versa Networks, and Veza. GitGuardian launches […]

React to this headline:

Loading spinner

Infosec products of the month: December 2024 Read More »

Ransomware in 2024: New players, bigger payouts, and smarter tactics

Ransomware in 2024: New players, bigger payouts, and smarter tactics 2024-12-19 at 06:03 By Help Net Security In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this article, you will find excerpts from

React to this headline:

Loading spinner

Ransomware in 2024: New players, bigger payouts, and smarter tactics Read More »

New infosec products of the week: December 13, 2024

New infosec products of the week: December 13, 2024 2024-12-13 at 06:04 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Horizon3.ai, SecureAuth, Stamus Networks, Trellix, and Versa Networks. Trellix Drive Encryption enhances security against insider attacks Trellix Drive Encryption offers enhanced security

React to this headline:

Loading spinner

New infosec products of the week: December 13, 2024 Read More »

Cato Networks extends SASE-based protection to IoT/OT environments

Cato Networks extends SASE-based protection to IoT/OT environments 2024-12-11 at 11:07 By Industry News With the introduction of Cato IoT/OT Security, Cato Networks is enabling enterprises to simplify the management and security of Internet of Things (IoT) and operational technology (OT) devices. Cato IoT/OT Security converges device discovery and classification, policy enforcement, and threat prevention

React to this headline:

Loading spinner

Cato Networks extends SASE-based protection to IoT/OT environments Read More »

Cybercriminals turn to pen testers to test ransomware efficiency

Cybercriminals turn to pen testers to test ransomware efficiency 2024-11-22 at 07:04 By Help Net Security Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate programs, according to Cato

React to this headline:

Loading spinner

Cybercriminals turn to pen testers to test ransomware efficiency Read More »

Cato DEM helps IT teams overcome network performance problems

Cato DEM helps IT teams overcome network performance problems 2024-10-15 at 16:01 By Industry News Cato Networks expanded the Cato SASE Cloud Platform by introducing Cato Digital Experience Monitoring (DEM). This announcement is the third major expansion to the Cato SASE Cloud Platform in 2024, following the additions of extended detection and response (XDR) and

React to this headline:

Loading spinner

Cato DEM helps IT teams overcome network performance problems Read More »

Why are threat actors faking data breaches?

Why are threat actors faking data breaches? 2024-06-24 at 07:16 By Help Net Security Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European car rental company immediately launched an investigation, only to discover that the data being sold was completely doctored, possibly using generative

React to this headline:

Loading spinner

Why are threat actors faking data breaches? Read More »

Find out which cyber threats you should be concerned about

Find out which cyber threats you should be concerned about 2024-06-05 at 06:01 By Help Net Security This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint | 2024 Voice of the CISO | May 2024

React to this headline:

Loading spinner

Find out which cyber threats you should be concerned about Read More »

Log4J shows no sign of fading, spotted in 30% of CVE exploits

Log4J shows no sign of fading, spotted in 30% of CVE exploits 2024-05-14 at 06:01 By Help Net Security Organizations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across networks, according to a Cato Networks survey. Enterprises are too trusting within their networks The Cato

React to this headline:

Loading spinner

Log4J shows no sign of fading, spotted in 30% of CVE exploits Read More »

Fake data breaches: Countering the damage

Fake data breaches: Countering the damage 2024-03-21 at 08:01 By Help Net Security Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions. Earlier this year, a hacker on a criminal forum claimed to have stolen data

React to this headline:

Loading spinner

Fake data breaches: Countering the damage Read More »

Cato Networks introduces new incident response tools

Cato Networks introduces new incident response tools 2024-01-23 at 17:31 By Industry News Cato Networks announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, a SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato SASE

React to this headline:

Loading spinner

Cato Networks introduces new incident response tools Read More »

Bridging the gap between cloud vs on-premise security

Bridging the gap between cloud vs on-premise security 01/12/2023 at 08:03 By Help Net Security With the proliferation of SaaS applications, remote work and shadow IT, organizations feel obliged to embrace cloud-based cybersecurity. And rightly so, because the corporate resources, traffic, and threats are no longer confined within the office premises. Cloud-based security initiatives, such

React to this headline:

Loading spinner

Bridging the gap between cloud vs on-premise security Read More »

The power of passive OS fingerprinting for accurate IoT device identification

The power of passive OS fingerprinting for accurate IoT device identification 31/08/2023 at 07:31 By Help Net Security The number of IoT devices in enterprise networks and across the internet is projected to reach 29 billion by the year 2030. This exponential growth has inadvertently increased the attack surface. Each interconnected device can potentially create

React to this headline:

Loading spinner

The power of passive OS fingerprinting for accurate IoT device identification Read More »

Scroll to Top