Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato CTRL Threat Research: Overview of BloodHound and Associated Collectors Including ShadowHound, SharpHound, and SoapHound

Think back to when you were a kid, eyeing a cookie jar on the top shelf. Getting to it wasn’t just about reaching; it was about strategy. You had to avoid making noise, pick the sturdiest route, and time your move perfectly to avoid getting caught. Imagine having a team of expert scouts feeding you all the correct information: where the dangers are, which surfaces can support you, and the best way to grab that prize unnoticed. That’s exactly what BloodHound does.

The CISO's API Security Paradox: High Priority, Huge Blind Spots

In today’s digital-first world, APIs serve as the core infrastructure of modern business. They power mobile applications, facilitate critical cloud integrations, and support digital transformation initiatives. It's therefore understandable that 73% of CISOs consider API security a top or critical concern. However, a recent survey of 300 security leaders uncovers a troubling paradox: a large gap between awareness and action.

Why Banks Need Regulatory Clarity on Permissionless Blockchains

Banks and Financial Market Infrastructures (FMIs) have approached blockchain technology with both excitement and caution in recent years. They have been discouraged by regulators from engaging with permissionless blockchains. Many financial institutions have spent large amounts of time and money developing digital asset capabilities on highly permissioned and proprietary alternatives.

What is Continuous Signing in CI/CD? Importance and Best Practices

Keeping your software secure has become more important than ever due to various types of cybersecurity threats. If you are thinking about what measures you can take to protect it, then Continuous Signing in CI/CD is one way. Continuous Signing in CI/CD (Continuous Integration/Continuous Deployment) is a method that helps ensure that your code and data are protected throughout the development process.

WatchGuard Report: Malware Explodes Across Network and Endpoints

In WatchGuard’s just-released Q1 2025 Internet Security Report, one thing is clear: attackers are getting faster, stealthier, and more sophisticated, powered by an underground boom in AI tools. The numbers speak for themselves: These insights paint a clear picture: evasive, AI-driven threats are reshaping the cybersecurity battlefield. Organizations must adapt with layered, intelligent, and proactive defenses to stay ahead.

Securing Public Institutions with Cloudflare One

Florida’s colleges, universities, and public agencies are under pressure to manage growing cyber threats while supporting hybrid access and stretched resources. Join Tom Coffey, Senior SASE Specialist at Cloudflare, to learn how organizations like yours are adopting Zero Trust and SASE with Cloudflare One to simplify security, reduce costs, and improve performance.

Understanding Multi-Factor Authentication

Looking back at the early 2024 data breach at Change Healthcare — a provider of revenue and payment cycle management that connects payers, providers, and patients within the U.S. healthcare system — one key detail stands out: Initial access into the healthcare system’s network was much easier due to a lack of multi-factor authentication (MFA).

Automating Your Laravel Deployment with GitHub Actions

Deploying a Laravel application can be a repetitive task; however, with the advent of GitHub Actions, developers now have the opportunity to automate this process, thereby reducing the potential for human error and accelerating the deployment cycle. Laravel GitHub Actions enables the execution of workflows based on specified events within a repository, such as a "commit or pull" request. For Laravel developers, this translates into a streamlined and more efficient development pipeline. Understanding how to leverage this tool can significantly impact your productivity and the reliability of your application deployments.

How Cybersecurity Online Programs Are Preparing the Workforce of the Future

The internet has become a big part of our daily lives. We use it for everything, i.e. from shopping and banking to staying connected. But as helpful as the internet is, it also comes with risks. Did you know that cybercrime costs the world about $6 trillion every year and is expected to rise to $10.5 trillion by 2025? To protect ourselves and our systems, we need skilled experts. This is where cybersecurity comes in. With 3.5 million unfilled cybersecurity jobs worldwide, cybersecurity online programs help prepare a new generation of experts to keep our digital world safe.