Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Egnyte and FedRAMP Compliance: Unlocking New Opportunities for the Public Sector

Federal agencies and contractors today are disproportionately targeted by cyber attackers as they store and manage sensitive public and government data. As a result, their data security standards need to be the most stringent, and software providers who partner with them must attest to the highest standards.

Fireblocks Adds Support for Leading Layer-1, Sui, Expanding Institutional Access to High-Performance DeFi

Fireblocks has officially launched support for the Sui, the blockchain built for mass adoption, enabling institutional clients to securely custody SUI assets and access the growing range of applications built on the network via WalletConnect. Sui joins the expanding list of blockchains supported by Fireblocks, reinforcing our commitment to bring our customers the ability to participate in the industry’s most exciting protocols.

Using SQLmap to Dig for Sensitive Data in SQL Databases

In our latest report Data Pirates' Toolkit (Leveraging SQLmap for Unearthing Digital Gold), we take a comprehensive look at a tried-and-tested cyberattack methodology that threat actors can use to unlock sensitive and critical data from unsecured databases: SQL injection (SQLi) attacks.

Why Microsoft Sentinel data lake Signals the Future of Security Operations

In our 1,200-plus Sentinel deployments, we've seen the same pattern play out repeatedly. Security teams forced to choose between comprehensive visibility and manageable costs. Logs getting aged out just when they become most valuable for investigations. Compliance requirements colliding with retention budgets. The pressure to do more with less doesn't come with a pause button. And until now, that pressure has meant making hard choices about what security data to keep and what to let go.

Humans Aren't the Weakest Link, Our Defences Are

For decades now we’ve been locked in this game of cat-and-mouse where attackers develop a new technique and defenders catch up, or defenders introduce a new control and attackers adapt. From the evolution of network security to identity and access control, many of our technical controls have matured into strong and reliable defences. Yet as we continue to see in the media, attackers continue to get in, compromising even the most mature and secure of environments, in seemingly simple way.

SaaS Security in 2025: Why Visibility, Integrity, and Configuration Control Matter More Than Ever

Software-as-a-Service adoption is exploding, but security teams are struggling to keep up. The Cloud Security Alliance’s 2025 SaaS Security Survey has revealed that while investment in and attention to SaaS security are on the rise, genuine control remains elusive, especially when it comes to configuration management, identity governance, and visibility.

Ransomware Trends in 2025

I’ve been following ransomware since the first one, the AIDS Cop Trojan, was released in December 1989. It locked up victim computers and asked for $300 to be sent to a Panama P.O. Box. A lot has changed since then. The invention of cryptocurrencies, particularly Bitcoin in January 2009, was largely responsible for the explosion of ransomware by 2013. This was when CryptoLocker ransomware was released to the world. Ransomware gangs have been making many billions of dollars per year ever since.

Inside Qubit Conference Prague 2025: Hacking Social Platforms and Securing AI

Qubit Conference Prague 2025 brought together some of the sharpest minds in cybersecurity—and Cato CTRL made sure to leave a mark. Not only did we share insights on AI-powered security, but we also marked a major milestone: the opening of our new R&D office in Prague. This expansion strengthens our global footprint and taps the best in the local engineering and development talent to help with the kinds of projects we present at Qubit.