Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato CTRL Threat Research: Two Vulnerabilities in Anthropic's MCP SDK Enable OAuth Token Theft and Supply Chain Attacks

The SolarWinds supply chain attack in 2020 reminded the world how a single weakness in trusted software can have global consequences. That incident reshaped how organizations view software integrity and the importance of securing every stage of the development pipeline.

Why IoT in Your Supply Chain Still Poses a Serious Cyber Risk

In today’s digital economy, every organization—whether a law firm, retailer, or financial services provider—is now part of someone’s critical infrastructure. A dangerous misconception persists: that Internet of Things (IoT) devices and Industrial Control Systems (ICS) are only concerns for industrial or manufacturing sectors. In reality, these technologies are quietly embedded in everyday operations across nearly every industry.

From Vulnerability Management to Exposure Management: The Platform Era Has Arrived

AI has collapsed the vulnerability exploit lifecycle. Adversaries now discover, weaponize, and exploit exposures across hybrid environments in minutes — chaining together misconfigurations, unpatched systems, and stolen credentials to gain rapid access and move laterally across environments. For defenders, the speed of the adversary changes everything.

Why AppSec Teams Need Authority to Match Their Accountability

Picture this: a critical vulnerability hits your dependency tree. Security flags it as high-priority, but the development team pushes back because the upgrade breaks three integration tests. Sound familiar? You’re not alone. It’s the same story for countless organizations, and it potentially costs your team countless hours of development time and revenue lost.

It's time for the defense and intelligence community to upgrade endpoint security

For more than 20 years, the US Intelligence Community (IC) and Department of Defense (DoD) have relied on a legacy Host Based Security System (HBSS) to provide basic endpoint security on critical networks. This solution has generally served its purpose by checking the box for endpoint security. However, most agencies still lack a truly integrated cross-operating system and cross-domain solution for endpoint detection and response (EDR).

One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM

At One Identity, we’re proud to share that Gartner has recognized us as a Visionary in the 2025 Gartner Magic Quadrant for Privileged Access Management (PAM). In a market transforming faster than ever, we believe innovation and proven performance matter most. Our placement as a Visionary reflects what we see every day with our customers and partners – a shared commitment to simplify security, accelerate adoption and bring intelligence to identity protection.

Deep Web Vs Dark Web: Key Differences and Safety Concerns

The internet we use every day is just the tip of the iceberg. It’s called the “Surface Web”. Beneath the surface web lies a vast hidden layer where legal and illegal activities sometimes take place anonymously. This hidden layer includes two key areas: Deep Web and Dark Web. Both are linked to online anonymity, but they serve different purposes. Understanding deep web vs dark web is important for staying informed and safe online.

Legacy vs. Cloud-native SIEM: Weighing the Pros and Cons

Choosing the right security information and event management (SIEM) solution is one of the most critical decisions you’ll make for your security program. As you evaluate your options, the central question is whether to stick with a traditional, on-premises SIEM or embrace a modern, cloud-native platform. This blog provides a direct comparison of the pros and cons of each, helping you make the best strategic decision for your organization’s needs.