Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is the Digital Operational Resilience Act (DORA)? Everything you need to know

The Digital Operational Resilience Act (DORA) is a comprehensive EU regulation aimed at financial entities and their third-party information and communications technology (ICT) providers. ‍ As a new and largely unexplored regulation, many affected organizations are still in the process of aligning their cybersecurity and risk management processes with the framework.

Building a Vulnerability Management Program from Scratch

Building a vulnerability management (VM) program from the ground up is no small feat. It requires technical expertise, organizational buy-in, and a clear roadmap. In recent months, I’ve been working with a client who had to discard their legacy approach and start afresh. We came to realize just how many components have to come together to get a decent start on a VM project while also showing value along the way.

Addressing Cloud Security Blind Spots for Better Protection

As businesses increasingly migrate to the cloud, securing these dynamic environments has become more challenging than ever. Traditional security measures struggle to keep pace with the evolving threat landscape, leaving organizations vulnerable to undetected cloud security risks. One of the biggest challenges in cloud security is the presence of blind spots—hidden cloud security vulnerabilities that attackers can exploit.

Announcing our $125M Series C fundraise

Today, we celebrate an exciting milestone in the Tines journey, a $125 million Series C fundraise from both new and existing investors, and company valuation of $1.125 billion. While these are big numbers, they reflect something even bigger - the opportunity to continue building what our customers already recognize as a life-changing product.

Importance of Continuous App Store Monitoring | Storeknox

Mobile apps have evolved into integral components of modern enterprises. They power core operations across industries, from financial transactions to managing health data. While over 80% of businesses rely on mobile apps for customer engagement and services, security must extend beyond the initial launch. While organizations invest heavily in pre-release testing and security checks, they often overlook the threats emerging after the app is available.

GigaOm and Frost & Sullivan Recognize Cato Networks for SASE Innovation

The latest recognition of Cato Networks in the 2025 GigaOm Radar Report for Secure Access Service Edge (SASE) is just the newest example of our continued excellence in secure networking. Cato was named a Leader and Outperformer for a second consecutive year. Recently, Cato has been recognized for its innovation and leadership in AI-driven security, overall security efficacy, and SD-WAN by Frost & Sullivan and GigaOm.

Top Code Signing Mistakes & Its Solutions: Prevent Software Attacks

In the era of the digital world, implementing software security measures is not only crucial but also a time-consuming and expensive process. More often, these security measures are implemented by humans prone to making mistakes. These mistakes cause security breaches in the software, ultimately causing nasty consequences to the company’s revenue. As per a report published in 2024, 68% of data breaches were caused by human errors.

Linux Kernel 6.14 Released: Key Features, Improvements, and What's New

Linux Kernel 6.14 significantly enhances security, performance, and hardware support. Compared to the previous updates, Linus Torvalds has described this as a “tiny” release; still, it comes with half a million lines of code changes and over ten thousand commits, labeling this as one of the critical updates for developers, system administrators, and people who use Linux.

Ransomware in the Global Healthcare Industry

Following the World Health Organisation (WHO) hosting a webinar to discuss the critical importance of cybersecurity in the healthcare sector, it is clear the severity of the situation the industry is facing is coming to the fore. Healthcare organizations are increasingly relying on digital systems to facilitate their daily workflow, but the prevalence of outdated legacy technology in the sector is rendering it vulnerable to cyberattacks with severe consequences.