Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The Rise of Student-Powered Security Operations Centers (SOCs)

In today's digital age, the prevalence of cyber attacks has become a major concern for organizations across various industries, with higher education institutions particularly vulnerable. As the volume and complexity of cyber threats continue to escalate, there is a growing need for innovative solutions to bolster cybersecurity defenses.

Cato Networks Wins 2024 Vendor Net Promoter Score Award from AVANT

At the 2024 AVANT Special Forces Summit in Phoenix in September, Cato Networks won the 2024 Vendor Net Promoter Score Award. AVANT is a technology services distributor (TSD) based in Chicago and a Cato partner. Cato was recognized for achieving a net promoter score (NPS) of 93 across two categories: An NPS score measures how likely customers are to recommend a company or its products and services to others. To put things in perspective, the average NPS score for a technology vendor is 64.

Streamline SASE Operations with Skope AI-powered Cloud Orchestrator

This is the third blog in our series, where we embark on a journey of Branch Transformation with the Next Gen SASE Branch solution. Built on the Netskope One SASE platform, the Next Gen SASE Branch solution combines its three layers–Context-aware SASE Fabric, Zero Trust Hybrid Security, and a SkopeAI-powered Cloud Orchestrator–into a unified cloud offering.

PIM vs PAM: What's the Difference?

The main difference between Privileged Identity Management (PIM) and Privileged Access Management (PAM) is their varying focuses. PIM ensures that users have necessary access based on their identity, while PAM stops unauthorized users from accessing sensitive information. Continue reading to learn more about PIM and PAM, in addition to what distinguishes them from each other.

Essential Guide to CyberArk's Privileged Access Management (PAM)

CyberArk’s Privileged Access Management helps organisations secure privileged accounts and protect sensitive data from cyber threats. This article covers its key features, how it works, and the benefits it offers for cybersecurity, with insights on how it stands out in the market.

BDRSuite Beta Release: Exciting New Features for Proxmox Environment, Including Proxmox Cluster Backup Support

BDRSuite has taken a significant step forward with its latest beta release, focusing on expanding backup support for Proxmox cluster environments. This beta version introduces several powerful features designed to enhance the flexibility and efficiency of backup and recovery processes.

SenseOn MDR vs. SocGholish: A Technical Analysis

In February of 2024, SenseOn was contacted to assist with investigating suspicious activity on a customer’s estate. SenseOn analysts quickly identified a malware infection and identified the variant as SocGholish. This blog will showcase SenseOn’s detection and response capabilities against the malware and a breakdown of SocGholish’s techniques and that of the threat actor observed.

Jonathan Freedman Appointed Head of Information Security at The Cyber Helpline

We are excited to announce that Jonathan Freedman has joined The Cyber Helpline as our new Head of Information Security. With over two decades of experience in Information Technology, Enterprise Architecture, and Cybersecurity, Jonathan is dedicated to safeguarding the digital landscape. He currently serves as the Head of Information Security at London law firm Howard Kennedy, where he leads the Cybersecurity Team.

Docker Zombie Layers: Why Deleted Layers Can Still Haunt You

Docker Zombie Layers are unreferenced image layers that continue to exist for weeks in registries, even after being removed from a manifest. In this hands-on deep dive, we explore how these layers can persist in registries and why ensuring the immediate revocation of exposed secrets is critical.