Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Endpoint Dilemma: Why Your Critical Systems Are More Vulnerable Than You Think

In today’s connected OT, ICS and CPS world, critical infrastructure organizations have a need to extend remote access to employees, 3rd party contractors, and OEMs. But in the rush to support remote operations, many critical infrastructure operators have exposed their critical systems to a silent but severe risk: the user endpoint.

6 Key capabilities needed for managing Active Directory that reduce risk and offer IT teams an edge

Identity and access management (IAM) is about enabling secure, scalable and efficient operations across increasingly complex environments. The right IAM solution doesn’t just support IT, it actively reduces friction, tightens security and adapts to an organization’s environment. Better outcomes happen with solutions that align with organizational needs and don’t demand numerous workarounds.

Why we moved our ECS services from Fargate to EC2

At Tines, we rely heavily on AWS Elastic Container Service (ECS) to power our workflow automation platform. For a couple of years, we used Fargate as our default compute layer – offering simplicity and removing the need to manage underlying hosts. However, as we scaled, we started hitting the edges of what Fargate could reliably offer. This is the story of why we migrated our backend services to an EC2-backed ECS Capacity Provider and what we learned along the way.

Cato CTRL Threat Research: WormGPT Variants Powered by Grok and Mixtral

When large language models (LLMs) became popular following OpenAI’s public release of ChatGPT in November 2022, threat actors understood the potential of such systems and how they can be used in their malicious operations. However, the main challenge that threat actors encountered a couple of years ago is that the LLMs were censored and didn’t allow the creation of malicious content. Enter WormGPT.

AWS KMS Embraces the Quantum Era with ML-DSA Digital Signature Support

As quantum computing creeps closer, the cryptographic mechanisms on which today’s digital world relies are becoming more and more fragile. In a prescient move, AWS Key Management Service (KMS) now supports ML-DSA, one of the first post-quantum digital signatures, which has become a standard under FIPS 203. This is an important step in AWS’s broader efforts to prepare customers for the post-quantum secure future.

14 WhatsApp Scams & How to Avoid Them

WhatsApp has reached over 2 billion users worldwide, making it one of the most popular messaging platforms available for your phone, tablet, and desktop. It’s a great way to connect with friends, send photos, create group chats, and host video calls. It also gives scammers a huge field to play with when attempting to scam people online. To help you protect your data, finances, and accounts, we will explain the 14 most common WhatsApp scams cybercriminals use and how to prevent them.

SIEM Essentials for Security Operations

For many Security Operations Center (SOC) teams, every day feels like a balancing act just shy of burnout. The alerts don’t stop. The tooling gets in the way more than it helps. And analysts—the people at the heart of security operations—are left trying to untangle signals in a sea of noise, pressure, and constant escalation. This isn’t just a tooling issue. It’s a deeper misalignment: the gap between what SIEM was supposed to be and what security teams actually need.

The Complete Guide to Attribute-Based Access Control (ABAC)

ABAC is an access control paradigm where access rights are granted through the use of attributes associated with: Access decisions are made using policy rules that evaluate these attributes. For example, a doctor can access patient records only if they are on duty and the patient is in their department.

5 Overlooked Types of Endpoint Security You're Probably Missing

Most posts about types of endpoint security mention antivirus software, firewalls, or maybe EDR/XDR. And while those security technologies are important, they’re not enough. Cyberattacks have evolved. Today’s cyber threats target laptops, smartphones, and even IoT devices. Ransomware moves laterally. Zero-day exploits bypass signature-based defenses. Phishing attacks hit the end-user, not just the firewall.

Beyond Compliance: Using ASPM to Align Application Security with Business Objectives

Are you confident that your application security testing (AST) efforts are truly protecting your business, or are they just ticking boxes for compliance? These days, simply meeting regulatory requirements isn’t enough. Security teams face mounting pressure from alert overload, fragmented tools, and an ever-growing backlog of vulnerabilities. Meanwhile, executives demand clear evidence that security investments are driving real business value. So how can security leaders bridge this gap?