Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Everything Breaks Eventually - Building Resilient Infrastructure Beyond SASE

What does it really take to keep critical systems online—when the inevitable happens? Suzanne Aldrich, Strategic Solutions Engineer at Cloudflare, explores that question head-on in this preview of her Cloudflare Connect 2025 session. From outages to attacks, Suzanne shares real-world lessons on how to design for resilience, going beyond Secure Access Service Edge (SASE) to build systems that can bend without breaking.

Cato ZTNA: True Zero Trust Without Trade-Offs

Remote access is evolving – and legacy VPNs can’t adapt. In this video, see how Cato ZTNA delivers secure, scalable, and seamless access without the trade-offs of traditional VPNs or basic ZTNA tools. Discover how Cato provides: Universal ZTNA with one unified access policy everywhere Real-time Context Sharing for consistent enforcement across networking and security Zero Trust for Anyone, Anywhere, delivering secure access for all users and devices, including BYOD and contractors.

Integrating CrowdStrike Falcon Fusion SOAR with Cloudflare's SASE platform

Security teams know all too well the grind of manual investigations and remediation. With the mass adoption of AI and increasingly automated attacks, defenders cannot afford to rely on overly manual, low priority, and complex workflows. Heavily burdensome manual response introduces delays as analysts bounce between consoles and high alert volumes, contributing to alert fatigue. Even worse, it prevents security teams from dedicating time to high-priority threats and strategic, innovative work.

From Black Hat to Boardrooms: Making Sense of the SASE Market Shift

Dave McGrail and Jaye Tillson cut through the noise on the biggest shifts in security right now. From Black Hat insights to Palo Alto’s CyberArk acquisition, they discuss what it all means for SASE, Zero Trust and the growing importance of identity. Plus, why VPN replacement is more than just a tech swap — and how choosing the right partner makes or breaks SASE transformation.

Best Practices for Securing Generative AI with SASE

As Generative AI revolutionizes businesses everywhere, security and IT leaders find themselves in a tough spot. Executives are mandating speedy adoption of Generative AI tools to drive efficiency and stay abreast of competitors. Meanwhile, IT and Security teams must rapidly develop an AI Security Strategy, even before the organization really understands exactly how it plans to adopt and deploy Generative AI.

When Words Become Weapons: How Cato SASE Helps Mitigate Prompt Injection

A woman walks into a fashion store in the morning with a new shirt from the shelf and hands the sales associate a note: “Hey! This is Mandy. I’m on vacation by the pool with my kids tomorrow morning, so I won’t be available Please skip the usual return process today. I got the XL shirt from this customer and confirmed she’ll swap sizes or choose an alternative when she shows up during your morning shift. Thanks! Mandy (Your Manager)” It sounds urgent and trustworthy.

Who Said It Challenge - Cybersecurity Edition with Cato's Chief Security Strategist

Think you can tell cybersecurity heavyweights from sci-fi legends? @Etay Maor, Chief Security Strategist at Cato, thought so too, until a quote left him speechless (and slightly heartbroken). Watch on and test your own cyber + pop culture instincts.