Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato Networks

The Imperative of Data Loss Prevention in the AI-Driven Enterprise

As organizations increasingly integrate artificial intelligence (AI) into their operations, the nature of data security is undergoing significant transformation. With AI’s ability to process vast amounts of data quickly, the risk of data breaches and leaks has grown exponentially. In this context, Data Loss Prevention (DLP) has (re)emerged as a critical component for IT professionals seeking to safeguard sensitive information.

The Retail Industry's Need for a True SASE Platform

In today’s rapidly evolving retail landscape, where digital transformation is no longer a choice but a necessity, the importance of a robust and agile network and security infrastructure cannot be overstated. Retailers face a multitude of challenges, from managing vast networks across geographically dispersed locations to safeguarding sensitive customer data in an increasingly complex threat environment.

How to Build a RACI Matrix for Single-Vendor SASE Success

Selecting the right SASE (Secure Access Service Edge) vendor requires a solid project management tool that fosters collaboration between network and IT security teams. This collaboration, or team unity, will ensure alignment with an organization’s strategic goals while leveraging the respective expertise of stakeholders. Consequently, the selected SASE solution will meet network design, configuration, and security needs – essential for project success.

Riding the Wave: Why Channel Partners Can't Afford to Ignore the SASE Surge

In the ever-evolving landscape of IT services, channel partners like service providers, managed service providers (MSPs), and telecommunications companies have long played a crucial role in delivering enterprise networking and security solutions. However, a subtle yet powerful shift is emerging that threatens to disrupt this status quo. Single-vendor SASE (Secure Access Service Edge) solutions are rapidly gaining traction and quietly reshaping the competitive landscape.

Cato CTRL Threat Actor Profile: Yashechka

To further raise awareness on threat actor activity in the dark web and hacking communities, today we are introducing the Cato CTRL Threat Actor Profile. This will be a blog series that profiles various threat actors and documents notable activity that we are observing. Our inaugural Cato CTRL Threat Actor Profile is on Yashechka.

Cato CTRL Threat Brief: CVE-2024-38077 - Windows Remote Desktop Licensing Service RCE Vulnerability ("MadLicense")

Recently, CrowSec security researchers published a proof of concept (PoC) for a critical remote code execution (RCE) vulnerability in Windows Server (CVSS score 9.8), ranging all the way from Windows Server 2000 up to 2025. The vulnerable component is the Remote Desktop Licensing service, often deployed and enabled on Windows Servers using Remote Desktop Services. The exploit is a 0-click pre-auth exploitation, meaning no user interaction or authentication details are necessary.

Highlights from Q2 2024 Cato CTRL SASE Threat Report

At RSA Conference 2024, Cato Networks introduced Cato CTRL (Cyber Threats Research Lab), which is our cyber threat intelligence (CTI) team. Cato CTRL protects organizations by collecting, analyzing and reporting on external and internal threats, utilizing the data lake underlying the Cato SASE Cloud Platform. For 2024, Cato CTRL is publishing quarterly threat reports that provide an overview of the threat landscape.

How Cato's Managed SASE simplifies delivery of SASE to customers for our partners

How can our partners simplify delivery of SASE to their customers? We’re not leaving you to figure that out alone. MSASE (Managed SASE) was designed to make SASE delivery easier and better. Cato’s Sr. Director of Product Marketing, Sangita Patel, explains the idea behind our new offering.

A CISO's Guide: Avoiding the Common Pitfalls of Zero Trust Deployments

The world has evolved and the on-going momentum of Cloud and Work-From-Anywhere (WFA) has become unstoppable. CISOs have realized their traditional security architectures, specifically VPNs, are no longer adequate to ensure only authorized users have access to critical resources. This has made the role of CISO ever more important because we now have applications everywhere and people everywhere, leading to increased cyber threats everywhere.