Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato Browser Extension: Secure Access for Any User

Unmanaged and BYOD devices create significant security and compliance challenges for today's enterprises. The Cato Browser Extension addresses these issues head-on by providing secure, lightweight, and consistent browser-based access for contractors, vendors, and remote workers—without the headaches of traditional VPNs.

Beyond Agent-Washing: How Torq Delivers True Agentic Automation for Security

Eldad Livni is the Co-Founder and Chief Innovation Officer at Torq. Prior to founding Torq, Eldad co-founded and served as CPO of Luminate Security, a pioneer in Zero Trust/SASE. Following Luminate’s acquisition by Symantec, he went on to act as CPO of Symantec’s Zero Trust/Secure Access Cloud offering. The security industry has a new buzzword problem.

From Fragments to Full Picture: Turning Threat News into Actionable Campaign Intelligence

Consider this scenario: a critical zero-day vulnerability is announced for a popular enterprise software and you, as a threat analyst, are tasked with briefing leadership on which threat actors are exploiting it and how. You start to research and are immediately overwhelmed. One news site reports on a Chinese APT using the exploit, another blog details an Iranian group, and a third report lists CVEs without context.

OCSF for Security Hub: Sumo Logic and AWS speaking the same language

In technology, the proof of a lasting relationship is in the infrastructure — the pipelines, security services, and log plumbing have to work seamlessly together long before anyone sees the outcome. That’s precisely what Sumo Logic and AWS have built. Aligned around open standards like OCSF (Open Cybersecurity Schema Framework), integrated with services like Security Hub and GuardDuty, and connected through shared telemetry, it makes cloud security and observability possible at scale.

Faked Out: How a Fraud IRS Website Fueled a Sophisticated Remote Access Campaign

The BlueVoyant Security Operations Team (SOC) and Threat Fusion Cell (TFC) researchers recently analyzed a sophisticated phishing incident where a user was lured into visiting a fake IRS website to verify a “tax refund”. The scheme was initiated via a phishing email, leading the user to the fraudulent site.