Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2023

Guide to User Access Review: What Is It, Best Practices, and Checklist

Every company has workers that have been there from the beginning and worked in every department. Knowledge of the company’s processes makes them valuable employees, but they can also access and put at risk lots of sensitive data. Regular user access reviews can help you mitigate this risk and safeguard your critical assets. Regularly reviewing user access is an essential part of access management.

What the Financial Sector Needs Now: Risk-Based Vulnerability Management

According to the Verizon 2023 Data Breach Investigations Report, basic web application attacks, which consist largely of leveraging vulnerabilities and stolen credentials to get access to an organization’s assets, are the most prevalent pattern of attack against the financial services sector.

Cato's 5 Gbps SASE Speed Record is Good News for Multicloud and Hybrid Cloud Deployments

In the original Top Gun movie, Tom Cruise famously declared the words, “I feel the need! The need for speed!” At Cato Networks, we also feel the need for speed, and while we’re not breaking the sound barrier at 30,000 feet, we did just break the SASE speed barrier (again!).

What is a cloud migration and why do you need one?

In the past, organisations traditionally stored their data, applications, and resources in on-premises servers located in their building and typically managed by an in-house IT team. However, the modern work landscape has changed significantly, many businesses now prefer to migrate their IT infrastructure from on-premises to servers that are hosted and accessed through the internet, also known as ‘The Cloud’.

Cloud Defense in Depth: Lessons from the Kinsing Malware

In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth. These measures are indispensable for protecting critical assets and upholding the integrity of cloud-based systems. By establishing a comprehensive security plan, organizations can effectively convey their commitment to security and lay a solid foundation for a resilient and secure cloud environment.

Bearer CLI: 2 months in retrospect of new features and improvements!

Since we announced version 1.3 of Bearer CLI in early April, the team has been working relentlessly to make major movements and ship amazing new features. Before you read it all, we advise you to update to the latest version in the background 🙂, that way you can start exploring all right after finishing this article!

Did Your Password Leak Online? And What To Do About It

Chances are, if you’re reading this, you’re in a situation you don’t want to be in. Maybe you’re suddenly unable to log into your account, you’ve noticed some suspicious activity in your bank statements, or you’ve woken up to unwanted threatening emails. In the modern world of cyberattacks, it is not a rare occurrence for people to make mistakes online resulting in being hacked.

New Vulnerability in protobuf.js: Prototype Pollution - CVE-2023-36665

We have found a new Prototype Pollution vulnerability in protobufjs (CVE-2023-36665). The maintainer of protobufjs has issued an update that fixed the issue on 27 June 2023. The vulnerability was discovered by Peter Samarin using Jazzer.js with our newly integrated Prototype Pollution bug detector. This finding emerged in part from our collaboration with Google's OSS-Fuzz and puts affected applications at risk of remote code execution and denial of service attacks.

From Paper to Digital: Transitioning to OCR Bank Statements

Banks and other financial organisations must digitise their information for quicker storage and retrieval as they process millions of client papers annually. An developing technique called optical character recognition (OCR) makes it possible to extract data from PDFs and photos and convert them to Excel, CSV, and other formats. With the use of OCR, banks can swiftly extract client information from PDF documents, transform it, and make it searchable.

Three Guiding Principles to Follow in Cybersecurity | (Sanjay - Executive Director, MSCI)

Here are some highlights of the conversation between Sanjay (Executive Director, MSCI) and Venky (Founder, Indusface). Sanjay has worked in Microsoft for over 14+ years and shares his experience on secure coding best practices & methods to handle customer-sensitive data.

Methods to Follow While Accessing Customer Sensitive Data | (Sanjay - Executive Director, MSCI)

Here are some highlights of the conversation between Sanjay (Executive Director, MSCI) and Venky (Founder, Indusface). Sanjay has worked in Microsoft for over 14+ years and shares his experience on secure coding best practices & methods to handle customer-sensitive data.

What is a YubiKey? How Does it Work? [Detailed Guide]

Aren’t you a tech junkie? It does not matter anymore with YubiKey! But you must be thinking about how. This comprehensive guide dedicated to Yubikey will describe and update every necessary detail. As a reader, you must seek a one-stop solution for all your needs and asks about this device. And we have made sure to be mindful of it and curate content below that can surely answer your questions and doubts.