Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Expanding Enterprise Security with the Cato LAN NGFW

With enterprise-wide cloud adoption and the onset of hybrid work, the mission has become clear: to securely connect users to applications — no matter where they are. While solutions like Firewall-as-a-Service (FWaaS), Secure Web Gateway (SWG), and Cloud Access Security Broker (CASB) can protect WAN and internet-bound traffic, anything happening on the internal LAN is in a blind spot.

Seal Security and Socket Team Up to Fix Critical npm Overrides

When developing a JavaScript package with npm, direct dependencies are defined within the dependencies section of the package.json file. Developers manage these dependencies' versions using semver-compliant version specifications. This allows for precise control, from specifying exact versions to defining ranges that permit the package manager to select compatible versions.

The importance of Tier 0 and what it means for Active Directory

Your business depends on the protection of your most critical assets. Prioritizing Tier 0 assets and deploying a tiered administration model is a great way to strengthen the security protecting what matters most – your identities. We will discuss both of these concepts in detail in this post.

Snyk and ServiceNow: Streamlining Vulnerability Management with ServiceNow VR Assignment Rules

Snyk is committed to our partnership with ServiceNow, and together, we're revolutionizing how organizations manage Application vulnerabilities and risk. Snyk's market-leading developer security platform and ServiceNow's robust Security Operations (SecOps) capabilities offer a powerful solution for Application Security teams and Enterprise CISOs.

Combating Ransomware, Phishing, and Zelle Fraud at Financial and Bank SOCs

Banking and financial services companies sit on a goldmine of sensitive customer data, making them a prime target for phishing and ransomware attackers hoping to strike a payout. Even with defenses like MFA and security training, human error continues to be a critical point of failure for financial institutions — a 2024 report found that 3 out of every 1000 individuals working in banking click on a phishing link each month.

Cybersecurity Can't Wait: Modern Enterprises Must Adapt

Technology is evolving at a startling pace, perhaps faster than ever before. Businesses are scrambling to reap the rewards of these technologies, especially AI. But do they recognize the cybersecurity risks associated with these changes? The World Economic Forum’s latest Global Risks Report suggests not.

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector

Financial institutions are robbed in innumerable ways. Gunmen conduct physical attacks on bank branches; people commit credit card fraud; hackers attempt to break into ATMs and force them to spit out thousands of dollars, while other threat actors seek to bypass these small-scale incidents and go for millions via a cyberattack. After all, why steal a couple of thousand dollars, pounds, or Euros if you can attempt to blackmail an organization for millions, steal and sell its data, or a little bit of both?

10 Insights from 10 Years of Okta Businesses at Work

Over the past 10 years, the Okta Businesses at Work report has shown the strength of collaboration and security apps, with Slack emerging in 2015 as the fastest growing app. In the intervening decade, we have also been through a pandemic, smartphone saturation, and an increasingly cloud-focused world that touches both work and personal lives.

The Rise of AI Agents-Collaborative Intelligence

2025 marks a pivotal moment. It’s the year AI agents transition from experimental technology to an essential business objective in enterprise operations that can enable growth and scale. These digital counterparts extend human intelligence, redefine workflows and create a new frontier in automation, cybersecurity and decision-making.