Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The 3 Biggest Email Security Challenges Facing Legal Organizations

Law firms really are under constant pressure to meet tight deadlines, maintain client confidentiality and protect privileged communications. And like most aspects of life with technology so deeply intertwined, the same tools that make work possible can also be significant sources of risk. Consider something as basic as email; likely the most commonly used tool in the profession.

Build vs. Buy Access Control: Why Apono Is the Smarter Choice for Cloud & Security Teams

Security and engineering teams today face a tough balance: protecting sensitive resources while keeping developers productive. As organizations shift from on-prem to the cloud, access management becomes one of the biggest challenges. With more identities—human and non-human—gaining access to more resources across hybrid environments, the risks rise.

7 Man-in-the-Middle (MitM) Attacks to Look Out For

Today’s man-in-the-middle (MitM) attacks go far beyond coffee-shop Wi-Fi: they target browsers, APIs, device enrollments, and DNS infrastructure. Using automated proxykits and supply-chain flaws, attackers hijack session cookies, tokens, and device credentials—turning one interception into persistent, high-value access. Concerningly, these are not edge cases.

Unmanaged Doesn't Have to Mean Unprotected

Today’s enterprises are more fluid than ever. Employees work from personal devices, contractors join from unmanaged devices, and IT teams are expected to secure it all—without adding complexity or degrading performance. But most secure access tools were never built for this reality. The Cato Browser Extension offers a better way forward. It brings zero-trust access to unmanaged devices, BYOD, or third-party systems without installing endpoint software.

September Release Rollup: Improvements in Prompt Library, Autodesk Construction Cloud Integration, and More

We’re excited to share new updates and enhancements for September, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.

Create a Reusable Function to Validate Configuration Settings Across Device Types

In a typical enterprise environment, NTP server configurations may differ not just between vendors, but even across OS variants within the same vendor. Ensuring that these configurations are correct and standardized is critical for time synchronization, which underpins security, logging, and automation.

From Folding to Folded: Hacking High Volume Mailer Machines

The Quadient DS-700iQ is a high-volume folder-inserter machine designed for automating the process of assembling, folding, and inserting mail into envelopes for large mailing operations. It features a modular design that can handle complex mailing jobs, supports multiple feeders and enclosures, and offers integration with barcode/OMR/2D scanning for document integrity and sorting.

Introducing Mend.io's AI Security Dashboard: A Clear View into AI Risk

Most dashboards are like a busy beach with one lifeguard watching the entire shoreline. They keep an eye on everything, but the sheer scope means that critical issues—like risks in AI applications—can get lost in the crowd. Mend.io’s AI Security Dashboard changes that. It’s like a lifeguard tower posted directly at the AI section of the beach, keeping a sharp, dedicated watch on AI specific risks that other tools overlook.

PCI DSS 6.4.3 Script Management: What CISOs Actually Need to Know

Tell me if you’ve heard this one before: a company audits its checkout page and discovers 47 scripts running. Only 12 were approved. The other 35? A mystery, and a risk. Nobody knows who added them or whether they’ve been compromised. That’s what we’re here to talk about today.