Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Evolution of Qakbot: How Cato Networks Adapts to the Latest Threats

The world of cybersecurity is a never-ending battle, with malicious actors constantly devising new ways to exploit vulnerabilities and infiltrate networks. One such threat, causing headaches for security teams for over a decade, is the Qakbot Trojan, also known as Qbot. Qakbot has been used in malicious campaigns since 2007, and despite many attempts to stamp it out, continues to evolve and adapt in an attempt to evade detection.

DNS-Based Threats and Their Impact on Business

A Domain Name System (DNS) is a protocol that translates human-readable domain names/URLs—like favoritewebsite.com—into IP addresses that computers can read—like 135.24.56.98. DNS servers handle tens of thousands of queries that transfer minute bits of data between devices, systems, and servers—which makes DNS an attractive and easily exploitable vector for hackers (Cloudns.net).

Elevate your AWS Experience: Unleash the Power of Veeam BaaS with David Johnson and Sagi Brody

In this video, we're taking a deep dive into the world of Veeam's BaaS solutions on AWS. You'll get an insider's perspective on navigating this powerful tool, optimizing your backup strategy, and ensuring seamless recovery. With Industry Leaders David Johnson and Sagi Brody! Unleash the Potential of Your AWS Environment! In this highly informative webinar, we bring you two renowned experts in AWS Marketplace: David Johnson, Head of Business Development at AWS Marketplace, and Sagi Brody, CTO at Opti9.

How to reduce your RPO and recover rapidly from failure on your K8s Cluster with Trilio and Mirantis

What is Continuous Restore Trilio’s Continuous Restore capability enables migration and replication of stateful applications in seconds or minutes so that all Organizations can protect and use their data anywhere - regardless of what the application runs on or where the data is stored. This innovation enables data-driven organizations to access ‘Single-Source-of-Truth’ data from multiple heterogeneous clouds simultaneously, from any cloud or storage platform to another, providing near-instantaneous recovery times for your workloads.

OpenStack Tutorial: How to One-Click Restore OpenStack Workloads with Trilio

Trilio for OpenStack Tutorial - One Click Restore Trilio is the OpenStack-native data backup and recovery solution that gives OpenStack users the ability to restore entire workloads with one click. Trilio helps OpenStack users protect their clouds and efficiently create, store and manage point-in-time backups while providing policy-based recovery times to meet application SLA’s. Trilio is not a third-party legacy solution. It is the OpenStack-native backup service.

AWS in 30 recap

Last month, Lead Partner Solutions Architect, David Schott, presented a demo on how Snyk works alongside Amazon Web Services (AWS) to identify vulnerabilities at every level of development and infrastructure. David covered why agile development in the cloud requires a different security approach than simply using the IT security methods of the past. Then, he showed a real-time example of how Snyk’s AWS cloud security tools can find and mitigate common vulnerabilities.

What is WAAP? - A Quick Walk Through

Many of the businesses that already have revenue-generating web applications are starting an API-first program. Now, old monolithic apps are being broken into microservices developed in elastic and flexible service-mesh architecture. The common question most organizations grapple with is – how to enhance application security designed for web apps to APIs and API security? Protecting APIs against modern cyber threats requires going beyond the traditional solutions.