Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Cato XDR: Finally, A Tool Built by People Who Actually Read the Logs!

Ever feel like some tools are designed by people who’ve never had to use them? Like those public restroom hand dryers that leave your hands wetter than before, or CAPTCHAs that make you question if you even know what a bicycle looks like—it’s like a bad joke at our expense. In the 2022 Devo SOC Performance Report, questions were raised about the biggest challenges faced by security operations center (SOC) teams.

Where the Shadows Lie

Shadow technology, regardless of name, is a manifestation of the same issue - unmonitored, unauthorized, or hidden technology operating outside official oversight. Over the past ten years, with the adoption of SaaS services, Shadow IT became a significant concern for security teams. With the more recent explosion of AI tools, we’ve started to hear the term Shadow AI being used for the same reasons.

WatchGuard Endpoint Security Excels in the 2024 Industry Awards and Reports

As businesses settle into the new year, managed service providers (MSPs) should thoroughly review and strengthen their customers' endpoint cybersecurity strategies. According to WatchGuard data, in Q3’2024, endpoint malware detections were up significantly. This is a 300% increase compared to Q2, highlighting the importance of strengthening security measures at this time of year.

What's new in Tines: February 2025 edition

Only allowing one test story at a time when change control is enabled is restricting. That’s why builders can now create multiple drafts in a story. Set changes live faster by duplicating drafts and publishing smaller edits first. And in the spirit of speed and efficiency, easily delete drafts from a story using the API. Read more on change control →

Solving Secrets Management Challenges for NHIs: GitGuardian Integration with HashiCorp Vault

Struggling with vault sprawl and NHI secrets? GitGuardian’s new HashiCorp Vault integration helps cybersecurity teams centralize secrets management, reduce blind spots, and strengthen security for today’s intricate infrastructures.

macOS Security: Understanding Threats and Building Defenses

As macOS becomes more prevalent in businesses, ensuring an application does not expose a user to vulnerabilities or your organization to business risk, is an important part of managing an organization’s risk. These apps often handle sensitive data, manage authentication and access system resources, making them attractive targets for cyber criminals to exploit. MacOS has unique security features that allow developers to build secure applications, but they must be correctly leveraged.

CrowdStrike 2025 Global Threat Report: Beware the Enterprising Adversary

Today’s adversaries have long been accelerating and evolving their operations. Now they are developing a business-like structure, refining and scaling their successful strategies, and exploring new technologies to cultivate a more efficient approach to cyberattacks. 2024 was the year of the enterprising adversary. The CrowdStrike Global Threat Report delivers critical insights into the evolving threat landscape and adversary behavior and tradecraft.