Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsegmentation That Stops Lateral LAN Threat Movement with the Cato LAN NGFW

Stop Lateral Threat Movement with Cato’s LAN Next-Gen Firewall! Traditional VLAN-based segmentation is no longer enough to stop lateral movement within your corporate network. Attackers exploit east-west traffic, moving undetected between users, devices, and workloads. How do you enforce microsegmentation without increasing operational complexity? Cato Networks introduces L7 LAN NGFW, a native feature of the Cato SASE Cloud Platform that brings application-aware security to your local LAN. It prevents unauthorized access and restricts communication across VLANs without manual configurations or complex ACLs.

The file and SaaS data perimeter is broken: data security needs data lineage

We are in the midst of a major technological shift. And when shifts happen, new industry-defining companies emerge. The winners aren’t just those with great ideas—they are the ones who adapt and respond to change the fastest.

How to Get Started with Arctic Wolf Managed Security Awareness

In this demo, see how easy it is to set up and deploy Arctic Wolf's Managed Security Awareness so that your organization can quickly realize the value and work towards ending human risk. Learn more how Arctic Wolf Managed Security Awareness ends human risk by delivering 100% relevant microlearning content.

Resurgence of a Fake Captcha Malware Campaign

During an Advanced Continual Threat Hunt (ACTH) investigation in early February 2025, Trustwave SpiderLabs discovered a resurgence of fake CAPTCHA verifications designed to deceive victims into executing malicious PowerShell scripts. This campaign employs a multi-stage PowerShell execution process, ultimately delivering infostealers such as Lumma and Vidar.

Expanding Enterprise Security with the Cato LAN NGFW

With enterprise-wide cloud adoption and the onset of hybrid work, the mission has become clear: to securely connect users to applications — no matter where they are. While solutions like Firewall-as-a-Service (FWaaS), Secure Web Gateway (SWG), and Cloud Access Security Broker (CASB) can protect WAN and internet-bound traffic, anything happening on the internal LAN is in a blind spot.

Seal Security and Socket Team Up to Fix Critical npm Overrides

When developing a JavaScript package with npm, direct dependencies are defined within the dependencies section of the package.json file. Developers manage these dependencies' versions using semver-compliant version specifications. This allows for precise control, from specifying exact versions to defining ranges that permit the package manager to select compatible versions.

The importance of Tier 0 and what it means for Active Directory

Your business depends on the protection of your most critical assets. Prioritizing Tier 0 assets and deploying a tiered administration model is a great way to strengthen the security protecting what matters most – your identities. We will discuss both of these concepts in detail in this post.

Snyk and ServiceNow: Streamlining Vulnerability Management with ServiceNow VR Assignment Rules

Snyk is committed to our partnership with ServiceNow, and together, we're revolutionizing how organizations manage Application vulnerabilities and risk. Snyk's market-leading developer security platform and ServiceNow's robust Security Operations (SecOps) capabilities offer a powerful solution for Application Security teams and Enterprise CISOs.