Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rewriting the Rules of China Connectivity with Cato SASE Cloud

What if operating in China didn’t require a separate architecture? For global enterprises, China is too important and too complex to ignore. Whether you’re already operating there or considering expansion, China introduces unique connectivity, security, and compliance challenges that most global architectures aren’t equipped to handle. Infrastructure gaps, regulatory demands, and inconsistent user experience combine to make China uniquely challenging for IT and security leaders.

Retail IT Reinvented with Cato SASE Cloud Platform

Retail IT is evolving fast – and legacy infrastructure can’t keep up. In this 3-minute video, see how Cato SASE Cloud Platform helps retailers simplify operations, accelerate store rollouts, and stay secure with a converged, cloud-native platform. Discover how to simplify store rollouts, maintain reliable performance, and protect customer data with PCI compliance from day one. Whether you’re scaling new stores or modernizing your entire footprint, Cato delivers the agility, security, and performance retail demands – in one platform, built for retail.

What Keeps CIOs Up at Night: Five Key Concerns and How SASE Brings Peace of Mind

Over the past nine years in the SASE business, I’ve had the privilege of speaking with hundreds of IT leaders—CIOs, CISOs, and IT executives. Through these conversations, I’ve found that five main concerns consistently keep them up at night. This blog aims to share those insights and highlight how I’ve seen Cato Networks’ SASE platform help address these challenges, allowing IT leaders to sleep a little easier.

Legacy Partnerships Are Costing You Customers: Power Up with Cato's Private PoP

Having spent over two decades navigating the evolving landscape of service provider partnerships, I’ve witnessed firsthand how challenging it can be for providers to maintain profitability and differentiation. Increasingly, relying on legacy vendors feels akin to selling customers a shiny new car equipped with an outdated engine—appealing at first glance but disappointing once in use.

Is Chasing the So-Called 'Best-Of-Breed' Cybersecurity Solutions Smart?

Let’s be honest: Chasing after the so-called ‘best-of-breed’ cybersecurity solutions might seem smart, but it often sets you up for operational headaches. It’s tempting—especially given the persuasive pitches from top-tier vendors—to select the best individual products for each security function.

Rewind in 5: Cato's 2025 So Far

We're halfway through the year, and Cato’s momentum hasn’t slowed. From major platform upgrades to cutting-edge security enhancements, 2025 has already delivered a wave of innovation. This short video recap distills the biggest highlights into under five minutes — a quick way to catch up on everything new and noteworthy. Watch the recap and let us know which release made the biggest impact for you.

Spider-Man, Security Questions, and Identity Fraud: A Cybersecurity Story

Ever seen that classic Spider-Man meme where three Spideys are pointing at each other, accusing the others of being impostors? It’s the perfect representation of identity confusion—after all, depending on whom you ask, the “real” Spider-Man could be Tobey Maguire, Andrew Garfield, or Tom Holland. It all comes down to context and baseline—what you grew up with, what you expect, and what “normal” looks like to you.

Cato CTRL Threat Research: PoC Attack Targeting Atlassian's Model Context Protocol (MCP) Introduces New "Living off AI" Risk

Most organizations assume a clear boundary between external users, who submit support tickets or service requests, and internal users, who handle them using privileged access. However, when an internal user triggers an AI action from a model context protocol (MCP) tool, such as summarizing a ticket, that boundary can break.

Cato + AWS: The power of partnership for a secure, connected cloud

In enterprise IT, there’s a familiar story: moving applications to the cloud is easy—but securely connecting cloud workloads isn’t. Cloud migration is no longer a question of if, but how fast enterprises can make the shift. As of 2025, an estimated 67% of enterprise infrastructure runs in the cloud, highlighting the widespread adoption of cloud hosting and infrastructure services worldwide.

Cato CTRL Threat Research: WormGPT Variants Powered by Grok and Mixtral

When large language models (LLMs) became popular following OpenAI’s public release of ChatGPT in November 2022, threat actors understood the potential of such systems and how they can be used in their malicious operations. However, the main challenge that threat actors encountered a couple of years ago is that the LLMs were censored and didn’t allow the creation of malicious content. Enter WormGPT.