Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding the basics of Cloud Security: Cloud Privilege Escalation

Cloud privilege escalation is a growing concern for organizations as they embrace cloud-based infrastructure and services. To address the risks associated with privilege escalation, it's vital to implement robust security practices. In this post, we’ll cover privilege escalation as it relates to cloud security risk and the best practices for mitigation.

Cut Costs, Not Corners: Risk Management Today

In today’s business landscape, managing risk has become an increasingly critical concern. The “usual” risks (such as data breaches) paired with the completely unforeseen ones (like the collapse of SVB) have made companies more cautious with their next steps. With tighter budgets and limited resources, it can be quite challenging for CISOs and CTOs to effectively manage risk while ensuring business continuity.

Why Penetration Testing is a Measure of Engineering Quality | Jonathan Care

Jonathan Care, a cybersecurity expert and analyst, explains why penetration testing is not just a compliance requirement, but a function of engineering quality. He challenges the traditional view of penetration testing as a separate activity and argues that it should be integrated into the development cycle. Watch this video to learn more about how security testing can help you improve your engineering solutions and reduce your risks.

How to Scale a Cybersecurity Program Across the Expanding Attack Surface

New security vulnerabilities are emerging every day. The number of new disclosed cyber vulnerabilities jumped 25 percent in 2022, and the number of known exploited vulnerabilities—ones observed to be exploited by malicious actors in the wild—nearly doubled from 2021 to 2022. Remediating vulnerabilities rapidly and effectively reduces the likelihood of your organization becoming the victim of a cyber attack. Consider.

What is SASE? #shorts

Cato Networks provides the world’s first converged SD-WAN and network security cloud platform built for digital business transformation. Cato connects all data centers, branches, mobile users, and cloud resources into a secure, global network uniquely powered by the scalability, self-service, and agility of the cloud. Cato empowers you to connect, secure, and run the network yourself, and supports you with expert-managed services if you need them.

Level Up Your Unit Tests: How to Turn a JUnit Test into a Fuzz Test

Unit tests are indispensable to check and prove that our code functions properly. But in unit testing, we only test the scenarios that we are aware of. However, there are scenarios unknown to us that lead to security vulnerabilities or performance problems. To address these scenarios, you can add fuzz tests in order to effectively find security, reliability, and even logic bugs in your code.