Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Wallpaper to Web App Firewalls: How I Went from Home Renovations to Cybersecurity

My career began far from blinking servers, network logs, and vulnerability scanners. I started with walls, ladders, and rolls of patterned paper. I was one of the many wallpaper installers who took pride in transforming plain, imperfect rooms into warm, vibrant spaces. Every project began with a tape measure in one hand and a bucket of paste in the other. Clients would invite me into their homes, trusting me to not only make their walls beautiful but also to treat their space with respect.

One Click to Zero Trust: How Cato's Agentless Microsegmentation Blocks Lateral Movement and Simplifies Network Security

One click on a malicious email. One compromised device. That’s often all it takes for malware or ransomware to spread across an entire network in minutes. In other cases, attackers move silently for months before striking. Cato’s agentless microsegmentation stops lateral movement at its source, isolating each device and preventing threats from spreading before they cause real damage.

Security Risks and Safeguards When Using Rotating Residential Proxies

Now, online privacy and anonymity are something of a commodity for both the people and the companies. As the online activities of individuals have increased, be it business, research, or personal reasons, the need for secure and anonymous internet browsing has also skyrocketed. One of these is using rotating residential proxies. These proxies provide the ability to hide your online identity, bypass geographical restrictions and anonymous browsing.

Using VPNs and Secure Tunnels to Protect Cloud Network Traffic

The fast rise of cloud adoption has reshaped enterprise IT, providing an unprecedented scale, flexibility and cost efficiency. But with this move comes a set of new security hurdles to maintain the control and guarantee the privacy of information that is exchanged across the network. The growing reliance on cloud by organizations for mission-critical applications and data has made the requirement of strong cloud network security a bit more urgent. Adding Security, enforcing policy and preventing data breaches have to start with protecting the flows of information between Users -> applications -> cloud services.

You Snooze You Lose: RPC-Racer Winning RPC Endpoints Against Services

The remote procedure call (RPC) protocol is one of the building blocks of Microsoft Windows and is widely used for inter-process communication between clients and servers. When RPC clients search for a server based only on a universally unique identifier (UUID) of an interface—without specifying an endpoint—they will go through the Endpoint Mapper (EPM). It will connect them to an endpoint that a server registered, exposing the interface the clients are looking for.

Where Fidelis NDR Fills the Gaps Left by Your Secure Web Gateway

Secure Web Gateways (SWGs) have become a cornerstone of enterprise security. They filter web traffic, enforce policies, and block known threats. But as attackers get smarter, many organizations are realizing one hard truth: a Secure Web Gateway alone is not enough.

Designing the Future of Agentic AI: Cato Engineering Details a New Practical, Secure, and Scalable MCP Server Framework

Some of you may remember the early days of security, when setting up a firewall or antivirus felt like enough. It was simple and gave us a sense of control. But over time, we learned that security is a moving target. What once felt sufficient quickly became just the starting point. In today’s agentic AI era, many treat their Model Context Protocol (MCP) setups the same way. If it’s running and returning results, it feels good enough. But the AI landscape is evolving rapidly.

Next-Gen Firebox Tabletop Series from WatchGuard Brings Flexible, Powerful, and Future-Ready Firewalls to MSPs

WatchGuard's new T Series Fireboxes provide intelligent firewall security, AI-powered threat detection, and eco-conscious hardware, giving managed service providers (MSPs) stronger threat protection with less complexity and waste.