Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Key considerations when choosing a business ISP

A Business Internet Service Provider (ISP) is a company that offers internet access and related services to businesses. Unlike residential ISPs, business ISPs are tailored to meet the higher demands and unique needs of businesses, such as greater reliability, faster speeds, dedicated support, and enhanced security. The choice of an ISP can significantly impact a company's operational efficiency, communication, and overall success.

Department of Justice disrupts Moobot botnet commandeered by Russian APT28: analysis of attacks against routers and malware samples

On February 15, the US Department of Justice announced “Operation Dying Ember”: the takedown of a botnet controlled by APT28, the Russian military cyber threat actor also known as Fancy Bear. APT28 was previously known for developing the VPNFilter botnet, which targeted routers and network attached storage devices and was also disrupted by the DoJ in 2018.

CloudFactory Eliminates "Head Scratching" with Cato XDR

More than just introducing XDR today, Cato announced the first XDR solution to be built on a SASE platform. Tapping the power of the platform dramatically improves XDR’s quality of insight and the ease of incident response, leading to faster incident remediation. “The Cato platform gives us peace of mind,” says Shayne Green, an early adopter of Cato XDR and Head of security operations at CloudFactory.

Top Two Cloud Security Concepts You Won't Want to Overlook

Organizations transitioning to the cloud require robust security concepts to protect their most critical assets, including business applications and sensitive data. Rony Moshkovitch, Prevasio’s co-founder, explains these concepts and why reinforcing a DevSecOps culture would help organizations strike the right balance between security and agility. In the post-COVID era, enterprise cloud adoption has grown rapidly.

Far Beyond the Firewall - Experiencing Alert Fatigue From Your Overwhelmed Firewall?

The cyberthreat landscape is ever-evolving and the level of sophistication from cybercriminals is always increasing. Networks are not impenetrable. Alarmingly, 79 minutes is now the average time from when an attacker compromises a network to when they start to move laterally, infiltrating the rest of the network.

Are Firewalls Alone Equipped to Mitigate Against the Increasingly Sophisticated Cyberthreats?

The sheer volume of data breaches continues to escalate at a phenomenal rate. Cyberattacks on all businesses, but particularly small to medium-sized businesses, are becoming more frequent, targeted, and complex. According to Accenture’s Cost of Cybercrime Study, 43% of cyberattacks are aimed at small businesses, but only 14% of those businesses are prepared to defend themselves.

Introducing Cato EPP: SASE-Managed Protection for Endpoints

As cyber threats continue expanding, endpoints have become ground zero in the fight to protect corporate resources. Advanced cyber threats pose a serious risk, so protecting corporate endpoints and data should be a high priority. Endpoint Protection Platforms (EPPs) are the first line of defense against endpoint cyber-attacks. It provides malware protection, zero-day protection, and device and application control. Additionally, EPPs serve a valuable role in meeting regulatory compliance mandates.

Embracing a Channel-First Approach in a SASE-based XDR and EPP Era

Today, we have the privilege of speaking with Frank Rauch, Global Channel Chief of Cato Networks, as he shares his insights on our exciting announcement about Cato introducing the world’s first SASE-based, extended detection and response (XDR) and the first SASE-managed endpoint protection platform (EPP).

Network Pentesting - Your Cybersecurity Secret Weapon

In today’s challenging economy, no company can afford to fall victim to cybersecurity trouble like a cyberattack or data breach. Companies can invest in a wide array of cybersecurity solutions to help safeguard their networks and data, but how can they be sure that they’re making the right security choices? Even with a solid investment in cybersecurity, a company could still have dangerous vulnerabilities that cybercriminals can exploit. Enter penetration testing.

Secure networking starts (and ends) at the endpoint

The last decade has been challenging for the cyber industry. Attackers always seem to have the upper hand while defenders play catch up. It’s common to point to the ever-accelerating frequency and sophistication of attacks, siloed security that creates gaps, and a shortage of skilled cyber professionals as rationale for this lagging position. All are true but none represent the core reason for our current situation.