Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Rise of Email Marketing Platforms for Business Email Compromise Attacks

In a statistical report published in September 2024 by the Federal Bureau of Investigation (FBI), it was revealed that more than US$55 billion was lost to business email compromise (BEC) attacks between October 2013 and December 2023. This profitability drives attackers to further their techniques and adapt to security filters. BEC is a highly sophisticated and researched scam that aims to bait a specific type of employee or department in a company.

Building a Sustainable PCI DSS 4.0 Compliance Culture

The Payment Card Industry Data Security Standard (PCI DSS) has long been recognized as the gold standard for payment security, establishing rigorous protocols for organizations that handle credit and debit card data. Designed to bolster defenses and minimize the risk of costly data breaches, PCI DSS is now poised for a major evolution. With the introduction of PCI DSS 4.0, new compliance requirements will become mandatory starting March 31, 2025.

AI in Cybersecurity: Friend or Foe?

Did you know that while AI is revolutionizing industries such as healthcare and finance, it’s also becoming a potent tool for cybercriminals? Fact Check – True. Ransomware attacks are becoming more frequent and sophisticated, driven by AI advancements. This blog examines AI’s dual role in cybercrime—both as a tool for attackers and a defense for cybersecurity—focusing on ransomware, data theft, and protective measures.

How Secure Is Your OAuth? Insights from 100 Websites

You might not recognize the term “OAuth,” otherwise known as Open Authorization, but chances are you’ve used it without even realizing it. Every time you log into an app or website using Google, Facebook or another account, OAuth grants that service limited access to your data without sharing your password. OAuth simplifies user authentication across platforms, making it a key part of secure online experiences.

Understanding the Brute Force Attack Playback and Defense Strategy

A brute force attack is a trial-and-error technique used by cybercriminals to gain access to sensitive information such as passwords, encryption keys, or login credentials. Essentially, it involves systematically attempting every possible password combination until the correct one is found. It’s akin to a thief trying to open a combination lock by testing every possible number sequence.

The Market Has Spoken: Cato Networks Soars with 46% ARR Growth in 2024

This past year was a defining one for all of us at Cato Networks and for the industry at large. The enterprise networking and security market is undergoing a seismic shift—one that we have long anticipated. The days of fragmented, bolt-on security solutions are over. The market has spoken, and it’s clear: enterprises demand a single, converged platform to securely connect their operations everywhere. Cato is delivering exactly that.

A Guide to Recurring Revenue for MSPs

Managed Service Providers (MSPs) play an important role in IT market. They offer businesses the expertise that is needed for optimizing the business operations. The Recurring revenue model is an interesting strategy which MSPs can adopt ditching the traditional billing method. This article explores the benefit of this Recurring Revenue Model and how this technique can foster client trust and support business growth.

Building a smarter retrieval system: Lessons from Vanta AI

At Vanta, we power a suite of AI products that enable thousands of customers worldwide to make critical business decisions. These products rely on the ability to quickly search through millions of customer documents to surface relevant information and drive accurate outcomes. ‍ Building a retrieval system capable of handling this scale and complexity was no small feat. Along the way, we learned valuable lessons that we’re excited to share.