Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Solving Tool Sprawl: The CISOs Guide to Efficient and Effective Security Operations

Time and time again, we see enterprise security teams facing complex issues that originate from a common pain point: tool sprawl. We get it; your footprint has grown, your tech stack is more complex than ever, and your security team is having to navigate this maze of “Wait, which dashboard do I use?” Perhaps it’s time for a change.

The Indispensable World of Red Teaming

In this mad, mad world of breaches, organizations are scrambling to keep their heads above water. It's like trying to navigate a minefield while blindfolded and riding a unicycle — one wrong move, and everything goes up in flames. So, how do you know your security controls are up to the task of defending your organization? This is where red teaming comes in.

The Future Of AI At Arctic Wolf

Arctic Wolf is addressing the exponential scale of security threats to business worldwide with our fusion of human intelligence, artificial intelligence, and one of the world’s largest data-streams of security observations. Join Arctic Wolf’s Dan Schiappa, Chief Product Officer, and Ian McShane, Vice President of Product, as they share their vision for AI in the context of the industry-leading Arctic Wolf Security Operations Cloud.

Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code

AI promises many advantages when it comes to application development. But it’s also giving threat actors plenty of advantages, too. It’s always important to remember that AI models can produce a lot of garbage that is really convincing—and so can attackers. “Dark” AI models can be used to purposely write malicious code, but in this blog, we’ll discuss three other distinct ways using AI models can lead to attacks.

Expanding the Vanta API to connect auditor tools

Vanta has helped auditors automate and simplify thousands of compliance audits, and we’re now making the process even easier. Today we’re excited to share that we’ve added new endpoints for auditor tools to the Vanta API, leading to a better collaboration experience for auditors and customers. ‍ With our new API endpoints, audit partners can integrate their tools with Vanta, allowing them to work in their preferred systems.

Employee Data Theft: Warning Signs & How to Prevent

How safe is your business from an employee stealing data? Employee data theft refers to the unauthorized access, transfer, or misuse of a company’s confidential data by its employees. Whether driven by malice or negligence, this type of data theft poses a significant risk to your business’s security and reputation. As incidents of insider threats rise, it becomes crucial for companies to identify the warning signs and implement the necessary preventive measures.

Cato's game-changing MSASE Partner Platform: Because service providers also needed a break

Managed service providers tell us they see great opportunity from so many businesses migrating to SASE. But many struggle to take advantage of it. Why is that? In this post, we’ll examine why service providers can find it hard to build a Managed SASE (MSASE) service, and four things they need when launching one.

Your AI Governance Blueprint: A Guide to ISO 42001 & NIST AI RMF

As businesses increasingly rely on AI to drive innovation and efficiency, ensuring that these systems are used ethically and safely becomes paramount. We’re here to help you build your blueprint to effective AI governance, stay compliant with global standards, and mitigate potential risks.