Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato Networks Demonstrates AI-Based Policy Analysis and Enforcement at AWS Summit Tel Aviv 2025

Policy misconfigurations remain one of the most common and costly risks in network security. Studies in recent years have shown that the vast majority of firewall breaches stem from policy configuration errors, and human mistakes or skill gaps continue to be a leading cause of major security incidents. Traditionally, organizations either wait for a breach or an audit to detect issues, both of which are reactive approaches.

Top tips: How to turn dark web alerts into your 1st line of defense

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we focus on how businesses can turn dark web alerts into their first line of defense against emerging cyberthreats. After hearing about a burglary in your neighborhood, you might install a security camera. You double-check your house locks when you hear about thefts nearby.

WatchGuard Named Champion in 2025 Canalys Cybersecurity Matrix

WatchGuard Technologies proudly celebrates its third consecutive year as a Champion in the 2025 Canalys Cybersecurity Leadership Matrix. This accolade underscores our leadership in unified cybersecurity and recognizes our commitment to innovation and excellence in the global cybersecurity ecosystem. The Canalys report, based on analyst evaluations, channel partner ratings, and market performance, positions us in the Champions quadrant for outstanding channel management and impact.

HIPAA Compliance, Fines, and Requirements Explained

HIPAA compliance is an essential legal act that came into effect to prevent healthcare data breaches and protect patient information. Throughout this article, we will give a comprehensive overview of HIPAA compliance, who it applies to, and how secure services like Internxt cloud storage can help the medical industry protect sensitive information with its secure product suite.

Network Security vs. Endpoint Security: Key Differences and Best Practices

When it comes to cybersecurity, there are many different systems to consider. But before focusing on any one of them, it’s important to start with a basic premise: when building a comprehensive cybersecurity strategy, implement multiple layers of security. This is known as a defense-in-depth strategy. A clear example is: network security vs. endpoint security. Endpoint protection secures individual devices, while network security safeguards the entire network.

The Missing Layer: Email Protection That Exchange Online and Gmail Users Urgently Need

In our previous blog (Beyond Attachments: How Email Becomes Your Biggest Data Exfiltration Vector), we exposed the critical gaps in standard email data loss prevention (DLP) tools that allow data exfiltration to continue despite significant investment in native controls. Organizations that have implemented targeted solutions to address these gaps report dramatic improvements in their security posture. Here's what comprehensive email DLP actually looks like in practice.

Takeaway from RSAC 2025: Focus on AI Utility

If you are at all involved in cybersecurity, then chances are you attended or talked to someone about the RSA Conference 2025. This year’s theme was “Many Voices, One Community” – a spot on description based on my experience. Yes, there were many voices – mostly talking AI, specifically agentic AI which is driving innovation and demand for security solutions.

Zenity and Microsoft Copilot Studio Extend AI Agent Security from Buildtime to Runtime

As enterprises race to adopt AI Agents to drive productivity and innovation. We are excited to announce that Zenity and Microsoft Copilot Studio are joining efforts to enable full adoption of AI Agents. Together, Zenity and Microsoft Copilot Studio help organizations confidently build, deploy, and use AI Agents with built-in security and governance throughout the development and deployment process so they can accelerate adoption at scale.

Operate Smart. Move Faster. Now Possible with Wallet Tagging and Sweeping.

This week, Fireblocks is expanding its platform with new capabilities that simplify, automate, and accelerate digital asset operations for your business. At the heart of the digital asset ecosystem, Fireblocks powers thousands of institutions moving billions in assets. As businesses grow in scale and complexity, so do the operational demands behind the scenes—from structuring wallets across clients and jurisdictions to ensuring funds move where they need to, fast.