Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CloudCasa Feature Update March 2025 - File Level Restore

Spring has just begun at most of Catalogic’s locations around the world, and outside plants are just beginning to sprout. But the CloudCasa team has been busy through the winter growing a bumper crop of new features and, to stretch the metaphor maybe a bit too much, now we’re ready to harvest them! We think you’ll be impressed with the new additions to CloudCasa in this release.

Top 7 Account Takeover Solutions

Due to compromised accounts, financial institutions lose billions annually in unauthorized transactions and account-related fraud. Airlines suffer millions in fraudulent ticket purchases, and retailers face widespread loyalty fraud and resold gift cards. Automated, bot-driven takeovers further amplify the issue, driving costly credential-stuffing attacks that inflate operational costs and burn through budgets. The list goes on, and the problem is only getting worse.

Enterprise Network Detection and Response Best Practices: 10 Tips for 2025

The cybersecurity landscape evolves rapidly. Threat actors develop sophisticated methods to breach defenses. Network Detection and Response (NDR) has emerged as a critical component in modern security solutions, identifying and mitigating threats traditional defenses miss.

AI's Content Gold Rush: Who's Getting Paid, Who's Getting Scraped, and How Businesses Can Turn Content into Revenue

The AI boom is creating a new content economy – one where savvy content owners are striking multi-million-dollar licensing deals, while others are being automatically scraped by bots to train AI models for free. It’s impossible not to have noticed the biggest names in AI, including OpenAI, Google, Anthropic, Perplexity and more, at the center of an argument about ethical content scraping.

Operationalize Data Security Automation with Cyera and Torq

Data is the critical foundation for all organizations, powering innovation, decisions, and growth. It’s also the fastest-growing attack surface, with sensitive information scattered across clouds, on-premise servers, and SaaS platforms. Cyera, the leader in modern data security, provides rich visibility into sensitive data down to its DNA level, providing vital context, identifying data risks and vulnerabilities, and delivering SOC teams a clear map of their data attack surface.

Compliance Plus Library Reaches 800 Pieces of Content

It seems like only yesterday that we launched the Compliance Plus training library as a result of customers asking us to address their needs beyond security awareness training. The team and I were just looking at our first few months where we had just over 20,000 customer completions in June of 2021. We have since had millions of users complete our content and the library has grown from 115 pieces of content at launch to over 800 pieces of content.

Top Network Penetration Testing Companies in 2025

Most teams approach network penetration testing the same way: pick a few well-known tools, run automated scans, and call it a day. But in today’s evolving threat landscape, that is a losing strategy. Attackers do not just rely on off-the-shelf exploits but adapt, chain vulnerabilities, and find gaps that automated tools miss. CTOs and engineering leaders need to rethink their approach with respect to context, strategy, and how they integrate into your security workflow.

The state of Falco: A year of progress since CNCF graduation

It’s been just over a year since open source Falco graduated from the Cloud Native Computing Foundation (CNCF) during KubeCon EU 2024, and the momentum hasn’t slowed down. From advancements in real-time threat response and expanded audit event collection across cloud-native environments, to reaching 150 million downloads and even new open-source technologies like Stratoshark being built on Falco’s libraries, the project continues to evolve rapidly.

Sysdig and Camptocamp announce partnership for strong cloud security based on open source

The cloud has become the hub of modern data traffic. It offers organizations of all sizes unprecedented speed, flexibility, and countless collaboration options. However, cybercriminals also know how to exploit the power of the cloud for their own purposes, which is why proven security solutions—and service providers who can implement them quickly and in a customized manner—are in high demand.

Celebrating our 1,000th Library entry - automated resource backup by GE Vernova

At Tines, we're committed to making workflow building as easy and efficient as possible. That’s why we’re so proud of our library, which reached an exciting milestone today when it officially became home to over 1000 pre-built workflows. These pre-built workflows, known to many Tines users as stories, are designed to foster knowledge sharing across the security and IT community, providing inspiration and shortcuts to help users build faster and more effectively.