Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

IT Budgeting in Economic Downturns

Dive into the world of IT budgeting with our illuminating video! Explore how different businesses allocate resources based on revenue and spending percentages. Whether you're a tech-focused giant investing up to 20% for cutting-edge solutions or a manufacturing entity assigning 5-10% for essential IT needs, gain insights into financial strategies that drive tech investments. Uncover real-world examples, from fintech firms with comprehensive tech budgets to manufacturing companies prioritizing cybersecurity and infrastructure. Simplify IT budgeting complexities, make informed decisions, and navigate evolving tech landscapes.

Prioritizing cyber resilience in response to a potential ransom payment ban

Ransomware attacks do not simply start and end with a locked computer screen and a ransom note. They unravel as intricate narratives, leaving a trail of financial wreckage, operational interruptions, and reputational damage in their wake. These attacks bear significant costs. In 2022, the average cost of a ransomware attack was a whopping $4.54 million, per IBM Security and the Ponemon Institute. And that does not include the actual ransom payment itself.

Remote Browser Isolation (RBI) with Cato Networks [Demo]

Learn how quick and easy it is to secure your internet traffic using Remote Browser Isolation by Cato Networks! Cato’s Remote Browser Isolation (RBI) service provides secure browsing through a virtualization service that streams web pages safely to the user’s device. In-browser code is executed remotely, keeping users safe from threats such as ransomware and phishing. Cato RBI is also simple to set up. It is accessible in minutes with just a few clicks, unlike some competitors who require complex setup. Cato RBI requires no maintenance: there is nothing to install and nothing to patch.

How we found a prototype pollution in protobufjs - CVE-2023-36665

In this webinar excerpt, our colleague Peter Samarin demonstrates how our prototype pollution bug detectors were able to uncover a highly severe CVE in the popular JavaScript library protobufjs. This finding puts affected applications at risk of remote code execution and denial of service attacks.

Impact of the New SEC Cyber Incident Reporting Rules on the C-Suite and Beyond

We recently hosted a compact and very engaging panel discussion about the new SEC Cyber Incident Reporting Rules due to come into effect later this year. We were fortunate to be joined by two well-known experts: In the post, we will *not* rehash what was said in the panel discussion. If you did not get to attend the live session, we invite you watch it on-demand – it’s 30 minutes well spent!

Mastering the Art of Trip Planning: A Comprehensive Guide

Planning a trip can be an exhilarating adventure that sets the stage for unforgettable experiences. Whether you're dreaming of exploring the pristine beaches of Bali, immersing yourself in the vibrant culture of Japan, or discovering the hidden gems of a random country, careful planning is the foundation of a successful journey. In this comprehensive guide, we will take you through the essential steps to plan your trip effectively, ensuring a seamless and enriching travel experience.

Major Supply Chain Cybersecurity Concerns and 7 Best Practices to Address Them

In today’s complex and interdependent world, it’s incredibly difficult to deliver a product or service without a supply chain. But this dependency creates additional risks – from reputational losses to major business disruptions. And with 62% of organizations being impacted by supply chain cyberattacks in 2021, mitigating risks created by third parties is extremely important.

9 Steps to Protect Against the Next MOVEit/MFT Attack

By now, the facts of the recent MOVEit breach are well known (although the victim total keeps climbing), but it never hurts to be reminded that these attacks do not take place in a vacuum and threat actors are more than happy to repeatedly use the same tactics if their targets remain vulnerable. Trustwave SpiderLabs, has tracked and documented these events explaining how threat actors were found to be exploiting three vulnerabilities, including a zero-day, (CVE-2023-34362, CVE-2023-35036.