Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato XDR Storyteller - Integrating Generative AI with XDR to Explain Complex Security Incidents

Generative AI (à la OpenAI’s GPT and the likes) is a powerful tool for summarizing information, transformations of text, transformation of code, all while doing so using its highly specialized ability to “speak” in a natural human language. While working with GPT APIs on several engineering projects an interesting idea came up in brainstorming, how well would it work when asked to describe information provided in raw JSON into natural language?

Every business leader should find their tractor

It’s easy for leaders to get swept up in the fast-paced and always-on nature of our jobs, leaving little opportunity for downtime. My mind races far too much, so it’s become important to find activities to engage in regularly that take me away from Zoom and Slack, and give me perspective.

Xalient achieves ISO 27001:2022 Recertification

In a significant achievement, we are thrilled to announce our successful transition to the ISO 27001:2022 standard whilst also undergoing recertification. This recertification is the pinnacle of Information Security Management. The recognition by BSI in December 2023, with auditors acknowledging our commitment as “up there with the best of them,” underscores our dedication to providing the highest level of service to our customers.

Do you still need antivirus protection for Windows in 2024?

The question of whether you need antivirus (AV) for Windows devices is always up for debate. The advancements and new technology have made the operating system (OS) more secure and reliable. Nevertheless, the effectiveness and lethality of cyber threats have increased as well. And every year, millions of Windows users fall victim to various digital perils.

Back to the Basics: Security Must-Haves for 2024, Part II

There is a tendency to be overwhelmed with the sheer volume of work that must be done in IT and security. While the experts debate on whether it is difficult or easy to do the work required, we’re focusing on the basics here. There are several components that need to be addressed, but none should be overwhelming. Remember, these are the basics of having a security posture that is defensible to your customers and regulatory bodies.

Maximize Your Productivity On-the-Go: Elevate Efficiency with Egnyte Mobile App

Today’s business world is more interconnected than ever. Communication gaps between teams, limited access to crucial data, and the inability to adapt swiftly to market shifts become pain points that slow down progress and hinder critical business decision-making. The Egnyte Mobile App is designed to address communication and collaboration challenges on-the-go.

Surge in deepfake "Face Swap" attacks puts remote identity verification at risk

New research shows a 704% increase in deepfake "face swap" attacks from the first to the second half of 2023. A report from biometric firm iProov warns that "face-swapping" fraudsters are increasingly using off-the-shelf tools to create manipulated images and videos.

APT29's Attack on Microsoft: Tracking Cozy Bear's Footprints

A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely to come. These recent events have sent shockwaves throughout the tech community, and for good reason. As we continue to uncover the fallout from these breaches, it has become apparent that the magnitude of the incident is more significant than we first realized.

Volt Typhoon: SafeBreach Coverage for US-CERT Alert (AA24-038A)

On February 7th, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) issued an urgent advisory to warn about the possibility of People’s Republic of China (PRC)-affiliated threat actors seeking to execute disruptive or destructive attacks by positioning themselves on IT networks belonging to critical infrastructure entities.