Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

It's time for the defense and intelligence community to upgrade endpoint security

For more than 20 years, the US Intelligence Community (IC) and Department of Defense (DoD) have relied on a legacy Host Based Security System (HBSS) to provide basic endpoint security on critical networks. This solution has generally served its purpose by checking the box for endpoint security. However, most agencies still lack a truly integrated cross-operating system and cross-domain solution for endpoint detection and response (EDR).

Why AppSec Teams Need Authority to Match Their Accountability

Picture this: a critical vulnerability hits your dependency tree. Security flags it as high-priority, but the development team pushes back because the upgrade breaks three integration tests. Sound familiar? You’re not alone. It’s the same story for countless organizations, and it potentially costs your team countless hours of development time and revenue lost.

From Vulnerability Management to Exposure Management: The Platform Era Has Arrived

AI has collapsed the vulnerability exploit lifecycle. Adversaries now discover, weaponize, and exploit exposures across hybrid environments in minutes — chaining together misconfigurations, unpatched systems, and stolen credentials to gain rapid access and move laterally across environments. For defenders, the speed of the adversary changes everything.

Why IoT in Your Supply Chain Still Poses a Serious Cyber Risk

In today’s digital economy, every organization—whether a law firm, retailer, or financial services provider—is now part of someone’s critical infrastructure. A dangerous misconception persists: that Internet of Things (IoT) devices and Industrial Control Systems (ICS) are only concerns for industrial or manufacturing sectors. In reality, these technologies are quietly embedded in everyday operations across nearly every industry.

Cato CTRL Threat Research: Two Vulnerabilities in Anthropic's MCP SDK Enable OAuth Token Theft and Supply Chain Attacks

The SolarWinds supply chain attack in 2020 reminded the world how a single weakness in trusted software can have global consequences. That incident reshaped how organizations view software integrity and the importance of securing every stage of the development pipeline.

UK Government Unveils Landmark Cyber Security and Resilience Bill for National

This week marks a pivotal moment for UK cyber-security policy: the government has introduced the long-awaited Cyber Security and Resilience Bill to Parliament. We’ve written about the significance of the long-awaited UK Cyber Security and Resilience Bill and why it matters to your business here, but this week the government has finally introduced it in parliament, promising that it will help bolster national security and protect the economy.

Cyber Insurance for SMEs: Reducing Premiums with Security

When it comes to cyber insurance for SMEs, many small and medium-sized enterprises believe that cyber insurance feels like an optional extra, not a necessity, something to worry about later. This risk-taking attitude is often driven by various common misconceptions: The opposite is often true. Smaller businesses are frequently seen as easier targets due to limited budgets, lean security teams, and less mature cyber defences.