Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Key To Detecting AI Threats - CTRLtheThreat Cybersecurity Tips From Cato CTRL

The key to detecting AI threats? Detecting them before they detect you. Tune in to this week's series in which Dolev Attiya, threat researcher and member of Cato CTRL, shares insights about AI malware threats, agent to agent and top ways to stay protected. Subscribe: short.url/aBcXyZ Let’s connect: Instagram: short.url/aBcXyZ LinkedIn: short.url/aBcXyZ X (Twitter): short.url/aBcXyZ TikTok: short.url/aBcXyZ.

Resilient by Design: Cato's Visibility and Backbone Performance Through the AWS Outage

On October 20, 2025, Amazon Web Services (AWS) experienced an outage affecting its US-East-1 region. The event caused temporary service degradation across a wide range of global applications and digital services, including business collaboration tools, financial platforms, airline operations, and consumer-facing websites used by millions of people worldwide, as reported in the news. We extend our appreciation to our partners at AWS for their swift and professional handling of the incident.

Cato CTRL Threat Research: Preventing Privilege Escalation via Active Directory Certificate Services (ADCS)

Maintaining an Active Directory (AD) enterprise environment is no easy task. Between all the permissions, security compliances, update cycles, emergency patches, appliance configurations and more, covering all the bases could feel overwhelming at times and could lead to errors that may result in major consequences.

Stop the Silent Spread with Unified ZTNA

Attackers exploit fragmented access controls and security blind spots to silently escalate their presence and prepare for data theft. The initial breach is usually only the start – what comes next will have a greater impact. Once an attacker compromises a single endpoint, the focus quickly shifts to expanding reach, moving laterally, elevating privileges, and staging data theft. If access controls are inconsistent or overly permissive, this becomes easy.

Meeting the Retail Industry's Evolving Cybersecurity Needs

Retailers face increasing cybersecurity threats while navigating stringent compliance requirements. With an extensive digital presence across physical stores, e-commerce platforms, and supply chains, retailers are prime targets for cybercriminals seeking to steal financial and personal data. Ransomware attacks, phishing, and point-of-sale (POS) system breaches can lead to substantial financial and reputational damage.

Decipher Me. What Hack Can You Detect?

What do people love more than secrets? Deciphering them. Join Etay Maor, founding member of Cato CTRL and chief security strategist at Cato, as he exposes the hidden mechanics behind AI prompt injections. From the secret codes of espionage to the subtle tricks of modern cybercriminals, this session connects the dots between history’s ciphers and today’s AI vulnerabilities. Because every secret has a pattern—if you know where to look.

XDR meets AIOps for Faster AI-Driven Detection and Resolution

Discover how Cato Networks helps you respond to security and networking issues quickly, easily and efficiently, in one place, with the AI power of Cato XOps. Watch this demo to see how XOps brings together XDR and AIOps to cut through huge volumes of events and alerts and provide one place to see what’s important, to investigate issues, and to mitigate threats quickly - across networking and security.

Unmanaged Doesn't Have to Mean Unprotected

Today’s enterprises are more fluid than ever. Employees work from personal devices, contractors join from unmanaged devices, and IT teams are expected to secure it all—without adding complexity or degrading performance. But most secure access tools were never built for this reality. The Cato Browser Extension offers a better way forward. It brings zero-trust access to unmanaged devices, BYOD, or third-party systems without installing endpoint software.

Cato Browser Extension: Secure Access for Any User

Unmanaged and BYOD devices create significant security and compliance challenges for today's enterprises. The Cato Browser Extension addresses these issues head-on by providing secure, lightweight, and consistent browser-based access for contractors, vendors, and remote workers—without the headaches of traditional VPNs.

Future-Proof Your Business with SASE and Zero Trust

Today’s enterprises are facing relentless change. Digital transformation, cloud migration, hybrid work, and M&A are moving faster than most IT organizations can keep up with. While the business demands speed and agility, IT and security teams are often constrained by fragmented tools, legacy systems, and skill shortages. As a result, CxOs are caught between two priorities: enabling innovation and ensuring a secure enterprise.