Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Stop Sensitive Documents From Leaking in Slack, Gmail, and ChatGPT (Demo)

Your security tools can detect credit card numbers, but they are blind to the files that actually matter. In this demo, we show how sensitive documents like: Internal source code Financial forecasts Performance reviews Customer lists are automatically detected and blocked in Slack, Google Drive, SharePoint, Gmail, and even ChatGPT using Nightfall’s new AI-powered file classifiers. No regex. No keywords. No training data.

CrowdStrike to Acquire SGNL to Secure Every Identity in the AI Era

I’m excited to announce CrowdStrike’s agreement to acquire SGNL, a leader in identity-first security. This acquisition will extend CrowdStrike Falcon Next-Gen Identity Security to deliver continuous, context-aware authorization for human, non-human, and AI agent identities across SaaS and hyperscaler cloud environments. As risk conditions and threats change, access to applications, data, and AI agents should change with them.

How OWASP Top 10 Maps to Data Exposure Risks: 5 Hidden Threats Explained

Most teams learn the OWASP Top 10 as a list of application security failures. Injection flaws. Broken access control. Security misconfiguration. Items to scan for, remediate, and close before the next audit or penetration test. But data exposure rarely arrives neatly packaged as a single OWASP finding. When sensitive data leaks, it is almost never because one category failed in isolation.

The Media Mogul's Take: Cyber & Storytelling in the Age of AI

Despite the connection with Robert De Niro, we won’t be spoiling Zero Day for you yet. But there is a large intersection between the future of media, cybersecurity, and AI, and we’re excited to jump into it! Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Sandy Climan (President, Entertainment Media Ventures, Inc.) in this webinar, where they chat about: SecurityScorecard monitors and scores over 12 million companies worldwide.

What is AI Security? The CTO's Guide to Securing LLMs & Models

Here’s an unsettling truth: While 80% of organizations are adopting AI, only 6% have any form of AI security strategy in place (SandboxAQ 2025 AI Security Benchmark report). It’s like buying a Porsche 911 without locks or keys, a cash-guzzling public service car whose cost you’re apparently happy to bear.

Savanti: How Agentic AI Supercharge Cato's R&D Efficiency

Savanti is Cato Networks’ internal, agentic AI assistant that blends knowledge from Slack, Confluence, Git, and Jira to provide instant, context-rich answers. Savanti routes each query through an adaptive reasoning workflow by choosing between direct, deep, or multi-step reasoning based on the question’s complexity. Every answer is grounded in real internal context, backed by citations, and evaluated for confidence before being delivered.

Defending Against Modern Email Threats With Layered, AI-Driven Security

Email has been the backbone of business communication for decades and as such, it remains the attacker’s favorite doorway into an organization. Phishing, Business Email Compromise (BEC) and supply-chain attacks continue to rise, with adversaries leveraging AI and compromised accounts to bypass legacy defenses. This presents many challenges for CISOs, IT Directors and SOC teams alike: it seems pretty clear that threats are evolving faster than traditional email security can keep up.