Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Secure Is Your OAuth? Insights from 100 Websites

You might not recognize the term “OAuth,” otherwise known as Open Authorization, but chances are you’ve used it without even realizing it. Every time you log into an app or website using Google, Facebook or another account, OAuth grants that service limited access to your data without sharing your password. OAuth simplifies user authentication across platforms, making it a key part of secure online experiences.

Understanding the Brute Force Attack Playback and Defense Strategy

A brute force attack is a trial-and-error technique used by cybercriminals to gain access to sensitive information such as passwords, encryption keys, or login credentials. Essentially, it involves systematically attempting every possible password combination until the correct one is found. It’s akin to a thief trying to open a combination lock by testing every possible number sequence.

The Market Has Spoken: Cato Networks Soars with 46% ARR Growth in 2024

This past year was a defining one for all of us at Cato Networks and for the industry at large. The enterprise networking and security market is undergoing a seismic shift—one that we have long anticipated. The days of fragmented, bolt-on security solutions are over. The market has spoken, and it’s clear: enterprises demand a single, converged platform to securely connect their operations everywhere. Cato is delivering exactly that.

A Guide to Recurring Revenue for MSPs

Managed Service Providers (MSPs) play an important role in IT market. They offer businesses the expertise that is needed for optimizing the business operations. The Recurring revenue model is an interesting strategy which MSPs can adopt ditching the traditional billing method. This article explores the benefit of this Recurring Revenue Model and how this technique can foster client trust and support business growth.

Building a smarter retrieval system: Lessons from Vanta AI

At Vanta, we power a suite of AI products that enable thousands of customers worldwide to make critical business decisions. These products rely on the ability to quickly search through millions of customer documents to surface relevant information and drive accurate outcomes. ‍ Building a retrieval system capable of handling this scale and complexity was no small feat. Along the way, we learned valuable lessons that we’re excited to share.

Who needs to comply with DORA? All your questions answered

The Digital Operational Resilience Act (DORA) has been developed to protect the financial sector, which is particularly vulnerable to cyberattacks. According to the IMF’s 2024 Global Financial Stability Report, the number of cyberattacks has progressively increased since 2004, and nearly 20% of these attempts target financial institutions. DORA serves as a regulatory measure in the European Union (EU) to improve cybersecurity and operational resilience of organizations in the financial sector.

Monitoring Applications vs. Operating Systems: Why It Matters

In today’s dynamic IT environments, securing and maintaining the integrity of your systems is critical. Fortra’s Tripwire Enterprise is a robust tool designed to help organizations ensure compliance and security by continuously monitoring the configuration and behavior of their IT assets. When deploying Tripwire, a common question arises: should you prioritize monitoring applications, operating systems, or both?

Ransomware: The $270 Billion Beast Shaping Cybersecurity-Insights from Cyentia's Latest Report

Ransomware has evolved into one of the most devastating cyber threats of modern times, creating previously unimaginable financial and operational hardships for entities in every sector. As malicious actors employ increasingly sophisticated tools, honing their tactics and spreading their tentacles, understanding the key trends, targeted industries, and financial impact is at the heart of successfully mitigating risks.

Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks

Security experts have warned that a cybercriminal group has been running a malicious and inventive phishing campaign since August 2024 to break into organizations across Europe, North America, Africa, and the Middle East. The Russian group, known as Storm-2372, has targeted government and non-governmental organisations (NGOs), as well as firms working in IT, defence, telecoms, health, and the energy sector.