Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Journey to SASE: a CxO Perspective | SASEfy 2025

True transformation happens when networking and security move at the speed of business. That’s what SASE makes possible. In his session at, Cato’s Chief Strategy Officer Yishay Yovel, shares how SASE aligns infrastructure and business transformation — creating a platform that’s simple, agile, and future-ready.

API Security Issues

How to Fix the Challenges with Web App Firewalls A10 expert Jamison Utter discusses with Gary Wang why API security is a challenge to manage, as these APIs are headless and cannot be accessed through a login. There is no authentication mechanism, such as completing a CAPTCHA. APIs are also vulnerable to bots, which complicates matters. Watch the full video to learn more about multi-layered approaches, threat intelligence, behavioral analysis, and protection against modern threats like bots and APIs.

AI-Driven Cyber Defense in Action: How AI Agents Are Saving SOC Analysts From Burnout

AI-powered SOC platforms are revolutionizing cybersecurity by dramatically reducing false positives and enabling analysts to focus on high-value security work. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Grant Oviatt, Head of Security Operations at Prophet Security, to explore how AI agents are transforming security operations centers (SOCs) and reshaping the future of cyber defense.

99% False Positives. Why Security Analysts Are Burned Out

•The brutal truth about cybersecurity work: Analysts spend their days chasing 99% false positive alerts instead of doing meaningful security work. Grant Oviatt reveals why security professionals didn't get into the field to send Slack messages asking if someone is "supposed to be traveling to Mexico today." This is why AI agents are becoming essential - to let security pros focus on what they actually signed up for!

Connecting China Without the Complexity - The Cato Approach

What if connecting China didn’t mean rebuilding your architecture, navigating telco red tape, or managing endless compliance workarounds? For global enterprises, China isn’t optional—it’s essential. From sourcing and manufacturing to logistics and go-to-market, your business depends on fast, secure, and compliant access through and across China. But most legacy architectures treat China like an exception—introducing latency, risk, and inconsistency right where you can least afford it.