Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Unleashing SASE for All: Empowering the Channel Ecosystem Business

The concept of Secure Access Service Edge (SASE) promised a revolution in network security. Its core intent: to simplify the deployment and consumption of both networking and security functions. However, does the reality really live up to the initial hype?

Why the DORA Regulation Matters Beyond the EU

The Digital Operational Resilience Act (DORA) is a robust cybersecurity regulation in the European Union (EU) taking effect next year. It is designed to help protect against evolving digital threats to financial systems. Like GDPR, the scope of DORA isn’t only limited to financial services companies and banks. Service providers in Information, Communications and Technology (ICT) and third-party vendors are also on the hook. If you haven’t been preparing, the time to be is now.

Gaining Network Transparency with Asset Discovery and Compliance for IT/OT

I recently came across the "Johari Window Model" and thought this would be a good way to gain inspiration to explain the conundrum faced by many cybersecurity customers. The table below shows us the breakdown of the stages that are applicable not just to IT and OT environments but also to other facets of our daily lives. This model can be applied to asset discovery and Fortra's Security Configuration Management (SCM) system.

Cato's game-changing MSASE Partner Platform: Because service providers also needed a break

Managed service providers tell us they see great opportunity from so many businesses migrating to SASE. But many struggle to take advantage of it. Why is that? In this post, we’ll examine why service providers can find it hard to build a Managed SASE (MSASE) service, and four things they need when launching one.

The Best Proxy Servers for Multi-Accounting

Business owners are increasingly recognizing its positive impact on business growth. Many marketing and sales strategies use different accounts on a single platform. However, despite its effectiveness in business, not all platforms allow multi-accounting. That’s where residential proxy comes in as an effective solution for multi-accounting.

Unified Defense: The Importance of Security Operations Center Integration

As cyber threats continuously evolve, hackers are refining their attack tactics and the frequency of assaults. Over the past several years, 63% of Security Operations Center (SOC) analysts report the size of their attack surface has increased, according to Security Magazine. Similarly, our 2023 Threat Roundup research discovered the enterprise is experiencing 13 attacks every second.

Quick start guide for using Calico policies for Calico Open Source users

Calico policies are a way to enforce network security at the pod level. This blog post will provide a comprehensive overview of Calico policies for Calico OS (Open Source) users. We will cover the basics of Calico policies, including what they are, how they work, and how to use them. We will also provide best practices for using Calico policies and examples of how they can be used in real-world scenarios.

OT Security Risk: Where Is It? What Can Be Done?

For security professionals and CISOs, reading about operational technology (OT) security risk feels like nothing new. We know a lot of OT is insecure by design. Despite advisory warnings and perceptions around operational security air gaps, industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) are being targeted more frequently via digital assets on the network. Vulnerabilities in OT systems are not brand new.

Securing the Future: A Candid Chat with Ava Chawla, Director of Cloud Security at AlgoSec

In the bustling world of cloud security, where complexity and rapid change are the norms, Ava Chawla, Director of Cloud Security at AlgoSec, sits down to share her insights and experiences. With a relaxed yet passionate demeanor, Ava discusses how her team is pioneering strategies to keep businesses safe and thriving amidst the digital transformation.

The AlgoSec perspective: an in-depth interview with Kyle Wickert, worldwide strategic architect

“We’re not just responding to the digital transformation anymore; it’s here, and frankly, most of us aren’t ready for it yet. One key insight from my time at AlgoSec is that at our very core, our mission is to enable seamless interconnectivity. This means staying ahead, embracing change as an opportunity for growth,” shares Kyle Wickert, highlighting the essence of AlgoSec’s forward-thinking approach.