Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

ThreatSync+ NDR: Bringing AI-Driven Threat Detection to Every Business

In a world where cybersecurity threats are ever evolving and increasingly sophisticated, businesses of all sizes need robust solutions to protect their networks. However, these solutions have traditionally been costly and complex. WatchGuard is changing that tradition with the launch of its new ThreatSync+ Network Detection and Response (NDR) solution.

Black Hat NOC: Zero Trust...but Verify | Corelight

The Black Hat network is unlike an enterprise network. The network operations center (NOC), which Corelight helps to operate, sees traffic that would never be permissible on most enterprise networks. Still, in many ways the Black Hat network is a microcosm of many real-world environments, with similar challenges that require similar solutions.

Build the foundation for airport networks with centralized DDI solutions

As airports embark on their digitalization journeys, the significance of connectivity is more pronounced. For an airport to function as a global aviation gateway, connectivity is no longer a mere utility but a strategic asset, crucial to its operations, much like its runways.

Learn about the top five types of cyber security

In today's digitally-driven world, safeguarding sensitive information is more crucial than ever. As cyber threats become increasingly sophisticated, understanding the different facets of cybersecurity is essential for individuals and organizations alike. In this blog, we'll delve into the top five types of cybersecurity measures that form the backbone of a robust defense strategy. From network security to cloud security, each type plays a pivotal role in protecting data, ensuring privacy, and maintaining the integrity of systems against malicious attacks.

CVE-2024-6387 OpenSSH RCE vulnerability ("regreSSHion") - Cato Networks impact and analysis

TL; DR – Multiple versions of OpenSSH are vulnerable to remote code execution. There is no working public PoC, and researchers have only been able to exploit the vulnerability under unique lab conditions. Cato Sockets by default do NOT have a publicly exposed SSH interface, it is always recommended to keep Cato Sockets LAN interface exposed only internally and use comprehensive network access controls to manage SSH access.

Do not allow anonymous enumeration of SAM accounts

The two policy settings in the CIS Benchmarks control the ability of anonymous users to enumerate the accounts in the Security Accounts Manager (SAM). By enabling the policy settings, users with anonymous connections will not be able to enumerate domain account user names on the systems in your environment.

Cato Networks recognized as a Leader in the 2024 Gartner Magic Quadrant for Single-Vendor SASE Report

SASE is all about strategically solving business problems. The systematic removal of technology barriers standing in the way of business outcomes. It is a brand new “how” (platform) for a well-known “what” (features). When we started Cato in 2015, we were immersed in skepticism. Can you actually build a cloud network that will replace MPLS circuits with decades of proven reliability?

Detecting The Agent Tesla Malware Family

Welcome to the latest from Corelight Labs! This blog continues our tradition of picking a popular malware family from Any.Run and writing a detector for it! Trending consistently at #1 on Any.Run’s malware trends list, Agent Tesla uses multiple protocols to communicate with its C2 infrastructure, making it more difficult to detect robustly than a malware sample utilizing only one network protocol for its C2.

Cato Survey: Remote Access Issues and Need for Increased Visibility Continue to Drive SASE in 2024

2024 is expected to be another year of strong growth in the SASE market. Dell’Oro Group predicts the SASE market will surpass $10 billion by the end of the year “representing more than a doubling of the total market in three years,” according to Mauricio Sanchez, Senior Research Director of Dell’Oro Group. Gartner expects the market for SASE to reach $25 billion by 2027. What’s driving this trend?

How Many Devices Do You Have? | Integration with ServiceNow CMDB

Is your network inventory spread across ServiceNow CMDB, spreadsheets, and various applications, leading to inaccuracies and causing you to overspend on service contracts? Discover how Forward Networks integrates with ServiceNow to seamlessly populate and update your CMDB with all organizational devices.