Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beginner's Guide to Building an Enterprise Application Security Program

Software development moves fast; updates are deployed daily, and new features seem to roll out constantly. For security professionals and developers, this pace brings both opportunities and risks. Building an application security program from scratch can be daunting. Expanding attack surfaces, unclear roles and responsibilities, and an endless stream of vulnerabilities from disparate tools create a complex and challenging landscape to navigate.

Why Vulnerability Remediation Breaks Down and How to Fix It

The biggest cybersecurity bottleneck for today’s enterprises isn’t detection. It’s remediation. Organizations are flooded with vulnerability data, but that flood rarely translates into effective action. Instead, security teams spend their time wrangling data, chasing tickets, and firefighting the same risks week after week. The outcome? Wasted effort, missed SLAs, and real business risk.

What is XML External Entity Injection? Find, Test and Prevent XXE Vulnerabilities

XML external entity injection or XXE, is a type of web security vulnerability and an application-layer cybersecurity attack. This vulnerability allows the hacker to interfere with an application while it is processing XML data. The attacker can inject unsafe XML entities into the application and can interact with systems to which the application has access. The hackers can also view files on the server and even perform remote code execution (RCE).

What is an SBOM and Why is it Critical to Third-Party Risk Management?

A decade ago, the primary focus of TPRM was questionnaire management and distribution, usually done in a simple and manual way, relying on vendors to self-report on their security practices. Today the basic best practices of TPRM have grown to include continuous monitoring and other advanced AI-based capabilities like CVE alerting for third parties as elementary aspects of an effective program.

Humans at the Center: Redefining the Role of Developers in an AI-Powered Future

In a previous blog, we discussed how AI is reshaping software development at every level. This shift means developers need new skills to stay effective. In fact, Gartner predicts that generative AI will require 80% of the engineering workforce to upskill through 2027. So what can today’s developers do to stay ahead? Here are a few steps to consider.

ThreatBook Selected in the First-ever Gartner® Magic Quadrant for Network Detection and Response (NDR)

After nearly a year of research and evaluation, Gartner released the first "Magic Quadrant for Network Detection and Response" report on May 29, ThreatBook became the only Chinese company selected.

Connecting China Without the Complexity - The Cato Approach

What if connecting China didn’t mean rebuilding your architecture, navigating telco red tape, or managing endless compliance workarounds? For global enterprises, China isn’t optional—it’s essential. From sourcing and manufacturing to logistics and go-to-market, your business depends on fast, secure, and compliant access through and across China. But most legacy architectures treat China like an exception—introducing latency, risk, and inconsistency right where you can least afford it.

Beyond Compliance: How Cyber Threat Intelligence Fortifies Third-Party Risk Management

Third-Party Risk Management (TPRM) is a critical function for modern organizations, given the reliance on external vendors and partners. The interconnectedness of digital ecosystems means that a breach at a third party can have severe repercussions for your organization. In a recent Dark Reading survey, 30% of organizations experienced some or many supply chain attacks over the past 12 months, and only 14% of respondents reported themselves confident their supply chain is completely secure.