Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Are WAFs Obsolete? Pros, Cons, and What the Future Holds

Web Application Firewalls (WAFs) have long served as the front line of defense for web applications, filtering out malicious traffic and enforcing security policies. But as threats grow more sophisticated and application environments become more dynamic, many are questioning whether traditional WAFs are still up to the task. In 2025, with the rise of cloud-native applications, APIs, and machine learning-driven attacks, it's no longer enough to rely on static, rule-based filtering.

Securing Remote Connections When Working from Multiple Devices

As remote work becomes routine, employees access systems from home, public WiFi, or shared spaces, making secure connections across multiple devices essential. This growing flexibility expands the attack surface, giving hackers more opportunities to exploit weak points. To stay protected, organisations need layered security measures, including strong authentication, encryption, and strict access controls. With remote access here to stay, understanding these essentials is critical for both IT teams and users.

Cato Networks Receives "Deployed on AWS" Badge on AWS Marketplace, Further Accelerating SASE Adoption for AWS Customers

Today, we’ve announced during AWS re:Inforce 2025 that Cato Networks has received the “Deployed on AWS” badge, which identifies Amazon Web Services (AWS) partners whose products are powered by AWS infrastructure. As a Leader in the 2024 Gartner Magic Quadrant for Single-Vendor SASE, Cato sets the standard for converging networking and security in a single, cloud-native platform.

When the Cloud Goes Dark: Why Owning Your Infrastructure Matters for Critical Services

On June 12, 2025, a global outage at Google Cloud Platform (GCP) brought critical infrastructure to a halt. The ripple effects were immediate. Services from Palo Alto Networks and Cloudflare—both of which rely on GCP—experienced outages that lasted hours. Enterprises depending on these services were left blind and exposed. This wasn’t a first. It won’t be the last. But it was a wake-up call. When SASE, SSE, or SD-WAN platforms go down, the business is down. Productivity stalls.

Corelight Named Leader and Outperformer in the 2025 GigaOm Radar for Network Detection and Response (NDR) Solutions

We’re thrilled to announce that Corelight has been ranked a Leader and Outperformer in the 2025 GigaOm Radar for Network Detection and Response (NDR) Solutions. NDR solutions are essential for continuous real-time monitoring and analysis of network traffic. Corelight's Open NDR excels at detecting known and unknown threats across on-premises, cloud, and hybrid environments, leveraging cutting-edge technologies such as artificial intelligence, machine learning, and behavioral analytics.

SSL Inspection in NDR: Unlocking Threats Hidden in Encrypted Traffic

Did you know that more than 90% of web traffic is now encrypted?1 Encryption makes online security better but creates a major blind spot for security teams. Cybersecurity analysts believe that over 90% of malware can hide in these encrypted channels and bypass traditional security measures. Almost every website today uses HTTPS to encrypt data between a user’s browser and the site. This encryption protects legitimate traffic but also hides potential threats.

Beyond VPNs: Secure Remote Access for OT & IIoT

Everybody loves a good throwback. Flip phones, vinyl records, and maybe even the dial-up tone for nostalgia’s sake. But if your operational technology (OT) and industrial internet of things (IIoT) environment is still relying on traditional VPNs to connect users, vendors, and machines, that’s one throwback you really don’t want. OT systems have evolved. They’re smarter, more connected, and unfortunately more vulnerable than ever.

Detecting Ransomware on Networks at Scale Using Traffic Analysis

Ransomware attacks are still causing serious financial and reputational damage to organizations. In May 2024, they made up 32% of all reported cyber incidents, and 92% of industries saw them as a major threat. These attacks lock important data and ask organizations for payment to regain access. Even after paying, attackers might have already gone through the whole system and left loopholes for future attacks. In some cases, ransomware hides in a network for a long time before being noticed.

Cato CTRL Threat Research: Uncovering Nytheon AI - A New Platform of Uncensored LLMs

With the introduction of WormGPT in 2023, threat actors have been using uncensored large language models (LLMs) for malicious activities. Following the shutdown of WormGPT in the same year, numerous alternatives have emerged—including BlackHatGPT, FraudGPT, and GhostGPT, among others—primarily accessible through Telegram channels.