Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato Networks Wins 2024 Vendor Net Promoter Score Award from AVANT

At the 2024 AVANT Special Forces Summit in Phoenix in September, Cato Networks won the 2024 Vendor Net Promoter Score Award. AVANT is a technology services distributor (TSD) based in Chicago and a Cato partner. Cato was recognized for achieving a net promoter score (NPS) of 93 across two categories: An NPS score measures how likely customers are to recommend a company or its products and services to others. To put things in perspective, the average NPS score for a technology vendor is 64.

Nearly Half of UK Companies Are Missing Essential Cybersecurity Skills

Cybersecurity skill gaps and shortages are often cited as a major reason that many organizations fail to implement effective security tools and practices. The UK’s Department for Science, Innovation, and Technology (DSIT) conducts an annual survey of the cybersecurity labor market in order to measure trends over time. This year’s research is largely in line with previous years, though there are changes and improvements in several areas.

Cloud Security Assessment: Checklist to Ensure Data Protection

The adoption of cloud computing has become a cornerstone of modern business operations today. However, this shift brings forth significant concerns about data protection and security. Cloud security assessment plays a crucial role in safeguarding sensitive information and ensuring compliance with industry regulations. Organizations must prioritize this process to identify vulnerabilities, mitigate risks, and establish robust security measures within their cloud environments.

3 Steps to Embedding Zero Trust Protection for CAD Files

Zero Trust is no longer a nice-to-have - it’s a must-have. According to Cisco, over 86% of enterprise organizations have started rolling out a Zero Trust framework to protect their business-critical information and ensure regulatory compliance, but only 2% have successfully implemented a mature ZT architecture. Zero Trust is no longer a nice-to-have - it’s a must-have.

How to Delete Files in PowerShell with Remove-Item

Managing files and directories is a common task in computing, especially in the Windows PowerShell environment. The Remove-Item in PowerShell is a key cmdlet for deleting files and directories, as well as other types of items in PowerShell. Remove-Item can be used for local file systems as well as other PowerShell providers like the Registry, Certificate Store, and Environment variables.

Cybersecurity Awareness Month: Adding Seasonal Spice to Managed Detection and Response (MDR)

It’s Cybersecurity Awareness Month and you know what that means. Pumpkin spice versions of Trustwave Managed Detection and Response (MDR) solutions are now available! Well, not really, but pumpkin spice season is the perfect time to raise awareness about the importance of cybersecurity and ensuring that individuals and organizations are equipped to protect themselves against cyber threats.

The Results from Dreamforce are In: Salesforce Users Love Rubrik

Dreamforce 2024 once again proved to be a monumental event, with major AI advancements, product announcements, and keynotes that inspired the entire tech community. Among the highlights, Salesforce's introduction of Agentforce took center stage, offering businesses the ability to deploy autonomous AI agents that optimize customer interactions and streamline operations.

Securing our world: Cybersecurity Awareness Month 2024

October marks Cybersecurity Awareness Month. This is a time to focus on the critical importance of cybersecurity and provide individuals and organizations with simple, effective tools to stay safe online and protect personal information. Increased awareness and taking appropriate actions are fundamental to a more secure digital work environment. The theme for this year, “Secure Our World,” emphasizes that cybersecurity is a shared responsibility.