Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Spain and Portugal Power Outages: Real-Time Observations and Service Continuity Through Cato SASE Cloud Platform

On Monday, April 28, 2025, widespread power outages affected large parts of Spain and Portugal. The exact root cause is still under investigation. These disruptions impacted regional infrastructure supporting connectivity, cloud services, and on-site operations.

No More Black Friday Fire Drills: How Elkjøp Transformed Retail IT with Cato

Black Friday is retail’s biggest moment—and retail IT’s biggest challenge. Spikes in traffic, strained systems, and the constant fear of outages turn what should be a commercial win into an operational war room. For many retailers, it’s a time of sleepless nights, emergency vendor calls, and systems pushed to their breaking point. But it doesn’t have to be this way.

SASE Talks on the Couch with Cato Networks' Abraham Gonzalez

Abraham’s got years of field experience, and he knows why customers hesitate: promises that never deliver. But once they see Cato in action, their perspective shifts completely. Watch below as Abraham shares a memorable moment when Cato made a customer's phone system work for the first time, all while delivering simplicity, power, and results. Ready to see a true SASE platform in action? Book a demo today.

Patching is Risky Business: By the Gartner Numbers

When I read Eyal’s blog, Why FWaaS is the Only Way Out of Endless Appliance Patching, I imagined a time in the immediate now (oxymoron intended); a time where the word “patching” is as quaint as rotary phones. In my mind, I was Marty McFly, jumping out of the DeLorean, shocked to discover that in the year 2025, we’re still patching appliance boxes. But here’s the kicker: everything has changed. Except the way we think about patching.

Cato CTRL Threat Research: Inside Shadow AI - Real-World Generative AI Application Usage Trends in SASE

The rapid adoption of generative AI (GenAI) in the enterprise is introducing a new category of unmanaged risk known as shadow AI. Organizations frequently lack insight into which employees are using GenAI tools and how they are being accessed, resulting in visibility limitations, policy enforcement challenges, and increased risk of data exposure. Security teams face potential data leaks and compliance violations, while IT teams struggle to integrate GenAI usage into existing governance models.

Why Swissport Chose Cato Networks to Secure and Streamline its Global IT Infrastructure

Swissport International AG is the world’s largest ground-handling company, ensuring seamless operations across 276 airports in 45 countries handling approximately 247 million airline passengers per year, as of the end of 2024. That kind of scale brings complexity. For Swissport’s new IT leadership, that complexity had grown into an unsustainable mix of legacy security controls, fragmented remote access solutions, and painfully slow troubleshooting. Then came the shift.

Cato CTRL Threat Research: Exploiting Model Context Protocol (MCP) - Demonstrating Risks and Mitigating GenAI Threats

Generative AI (GenAI) is advancing rapidly, offering significant potential for business transformation. However, it also introduces new security risks. The Model Context Protocol (MCP), an open standard introduced by Anthropic in November 2024, enables seamless integration between GenAI applications and external data sources and tools. MCP is commonly referred to as a USB-C port for GenAI applications.

Generative AI Usage Gone Rogue? Cato Networks Mitigates Shadow AI Risk with Cato CASB

Today during SASEfy 2025, Cato Networks announced its latest AI innovation. Cato CASB (Cloud Access Security Broker), a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for generative (GenAI) applications including a shadow AI dashboard and policy engine. With the shadow AI dashboard, enterprises can detect, analyze, and gain insights into the use of GenAI. With the policy engine, enterprises can take control of user activities in GenAI applications.

Cato CTRL Threat Research: OpenAI's ChatGPT Image Generator Enables Creation of Fake Passports

On March 25, OpenAI introduced image generation for ChatGPT-4o and ChatGPT-4o mini. On March 31, it was announced that the tool was available for free to all users. Since then, users have quickly discovered that ChatGPT’s image generator can be manipulated to create fake receipts and forge other documents.

Say Goodbye to SaaS Security Gaps with Cato CASB

As organizations increasingly depend on SaaS applications, IT teams struggle with visibility and governance. Shadow IT, unmanaged devices, and limited monitoring capabilities create blind spots, exposing enterprises to compliance violations, data exfiltration, and insider threats. Risks don’t come only from unsanctioned applications: even widely used SaaS platforms can become a security liability when not properly controlled.

The Future of SASE: Simplifying IT and Securing the Future

SASE emerged to address the challenges of digital transformation, providing the means to connect and secure enterprise resources – sites, remote users, and cloud resources — through a single, global network and security stack. The next phase of SASE will extend both its capabilities (what it delivers) and its delivery model (how it operates). AI will play a pivotal role in automating and optimizing SASE, while the scope of SASE will extend beyond the WAN to include LAN and cloud security.

Beyond Prevention: How Sandbox Enables Deep Forensic Analysis to Strengthen Security

For years, cybersecurity has focused on prevention: blocking threats before they execute. Next-generation anti-malware (NGAM) and signature-based Anti-Malware engines (AM) stop known threats and zero-day attacks. However, as threats grow more sophisticated, organizations also require deep forensic insights to fully understand attack patterns and identify proactive prevention strategies beyond blocking malware, enabling them to strengthen their defenses more effectively.

Master SaaS Security: Unifying Visibility & Control with Cato CASB

Shadow IT. Data leaks. Compliance violations. If your users are accessing cloud apps from unmanaged devices or outside sanctioned workflows, would you even know? In this video, we introduce Cato CASB (Cloud Access Security Broker), a native capability of the Cato SASE Cloud platform. Watch how Cato CASB provides deep real-time visibility into SaaS usage—both sanctioned and unsanctioned—so security teams can detect risky behavior, enforce access policies, and prevent data loss.

Why SASE Makes Zero Trust Work

Gartner predicted that by early this year, over 60% of organizations would be using zero trust as their starting point for security. And no wonder. Cloud migration, hybrid work, and persistent threats have turned security into a minefield, exposing the cracks in old castle and moat, perimeter-based security architectures. Zero Trust aligns with how and where we work today, shifting the perimeter to individual users, devices, and applications—wherever they are.

Agility Over Appliances - The Future of Firewall Security is FWaaS

Legacy firewalls are holding IT teams back. From costly hardware refreshes to constant patching and scaling headaches, NGFWs weren’t designed for today's cloud-first, hybrid-work world. In this video, we explore why managing firewalls has become a never-ending cycle of complexity — and how Firewall-as-a-Service (FWaaS), delivered as part of the Cato SASE Cloud Platform, breaks that cycle.

Master Advanced Threat Investigation: Forensic Analysis with Cato Sandbox

In this video, we walk you through how Cato Networks' anti-malware and NextGen anti-malware solutions block both known and unknown threats in real time—*before* they can spread. But stopping malware is only the beginning. Learn how Cato Sandbox takes your cybersecurity strategy to the next level by: We’ll show you how to quickly enable Cato Sandbox, demonstrate real-time malware blocking, and explore a full forensic analysis via the Cato Management Application (CMA). Watch as we break down.