Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Start Anywhere, Grow Everywhere: The Modular SASE Platform

Complexity is no longer just an operational inconvenience for a business when it’s slowing transformation and increasing costs. In a portfolio platform, that complexity is structural: separate inspection engines, overlapping functionality, and distinct policy frameworks. Cato is redefining what a true SASE platform means in the AI era - unifying architecture, reducing complexity, and unlocking measurable economic advantage. And best of all, it means starting anywhere, and growing everywhere.

Everyone is Deploying AI Agents. Almost Nobody Knows What They're Doing

AI agents are operating inside your enterprise; querying databases, triggering workflows, and taking action through APIs. As AI agents are adopted, organizations cannot see, track, or control what these agents are actually doing. In this session, Roey Eliyahu, Co-Founder and CEO of Salt Security, challenges the industry’s narrow focus on LLM safety and exposes the much larger, invisible attack surface created by agentic systems.

WatchGuard Recognized at the 2026 Cybersecurity Excellence Awards

We’re proud to announce that WatchGuard Technologies has been named Best Cybersecurity Company in the 2026 Cybersecurity Excellence Awards, recognizing innovation and leadership across the cybersecurity industry. While industry recognition is always an honor, this award comes at a particularly important moment for cybersecurity teams worldwide.

Using Agentic AI to Scale Threat Detection in Healthcare

For every human in a healthcare organization, there are 82 machine identities—service accounts, API keys, cloud functions, medical devices.2 That's the 82:1 ratio, and it means your team is fundamentally outnumbered. The Change Healthcare breach in 2024, which started with one unprotected Citrix credential and disrupted 40% of US claims processing,1 showed exactly what happens when that ratio goes unmanaged. The numbers back this up.

Why Banks Need Real-Time Privileged Session Monitoring

Ransomware and stolen credentials are among the most common and harmful attack vectors targeting financial institutions. Since banking systems store valuable financial assets and sensitive customer data, organizations must demonstrate strict control and oversight of privileged access to support regulatory and audit expectations under frameworks such as SOX, PCI DSS and GLBA.

Corelight's Virtual Resident - First Look

Discover Corelight's Virtual Resident tool! This video provides an overview of our new feature that serves as an AI-powered SOC assistant. This platform orchestrates specialized agents to query your SIEM and then return descriptions of threats, network evidence, and suggested next steps while maintaining the highest security standards. We provide a firsthand look at how adaptive playbooks and automated triaging can uncover hidden threats across an entire attack life cycle.

Tuning Machine Learning Settings in Fleet Manager

In this video, we introduce the basic features of Corelight's new Machine Learning and Anomaly Detection tools. We also dive into how you can optimize the machine learning settings to ensure your SOC remains focused on the most critical network threats. Check out this short video to see what these tools can do and to learn how they can help you in implementing your company's NDR plan.

How Amazon Storage Gateway Works: Complete Walkthrough

Amazon Web Services (AWS) is used by many users and organizations given its scalability, reliability, and other advantages. When migrating data to the AWS cloud, you should take into account certain features. By default, Amazon provides the web interface for managing the cloud environment and uploading/downloading files. However, using the web interface for regular uploading of high amounts of data may be inconvenient.