How to Spot Razy Malware Undetected By AV Systems
Examining traffic patterns can help spot malware such as Razy on users’ systems Note: Periodically, security researchers on the Cato Networks Research Lab publish internal findings gained while hunting threats on customer networks. These are security insights driven by networking data—something that’s only become practical with the convergence of networking ... Read More
Why It’s Time to Quantum-Proof Your Communications Infrastructure
It’s a matter of time until the day arrives when quantum computers will crack traditional encryption. This moment, often referred to as “Y2Q,” may be as little as three to five years away, given the billions of dollars of investment flowing into the field. While we can’t be sure of ... Read More
Cloud Compliance Doesn’t Equal Security
Despite continuous adherence to regulations, many organizations still fall prey to attacks. Ever since the cloud became the de facto infrastructure choice for forward-thinking organizations, it has enabled organizations of all sizes and types to scale and transform in ways they never imagined possible. But for all its benefits, the ... Read More
Now’s the Time to Revisit WFH Cybersecurity
It’s been more than eight or so months since the COVID-19 pandemic and the need for social distancing forced companies throughout the U.S. to rethink the way they do business, closing down offices and sending millions of employees to work from home. In fact, 67% of respondents to a recent ... Read More
Maintaining Governance and Security in Multi-Tool Environments
The massive shift to hybrid cloud architectures means enterprises are choosing a multi-tool approach to IT. However, the new multi-tool world inevitably creates security and governance challenges. The more tools you add, the more complicated things get. Each new tool requires comprehensive integrations to fit into your stack and access ... Read More
Online Voting: 3 Reasons Why It’s Not Possible (Yet)
The coronavirus pandemic has upended our way of life. As millions of Americans practice social distancing, restaurant and grocery deliveries have soared. Children are attending school online via conferencing apps. Adults are enjoying virtual happy hours with friends. And a record number of corporate employees are working remotely. Given all ... Read More
A Smarter Security Strategy for Healthcare Risks
In late October the FBI issued an alert regarding imminent and increased advanced ransomware risk to hospitals and healthcare providers in the U.S. Such attacks had already affected five hospitals that week. This is just the latest in a string of headlines regarding cyberattacks against the healthcare sector. Others include ... Read More
Implementing ZTNA: 4 Reasons Why Mobile is a Good Place to Start
ZTNA is a good fit for today’s remote workforce, and mobile is a perfect landscape to implement a ZTNA strategy Sitting behind a desk in an office is quickly becoming a thing of the past. Let’s not forget, even before the pandemic, a huge percentage of the workforce (70%, according ... Read More
Security Essential as Electric Vehicles Accelerate
The electric vehicle (EV) market continues to expand at a rapid pace and demonstrated strong year-over-year growth before the pandemic emerged. According to a recent survey by IEA, sales of electric cars topped 2.1 million globally in 2019, boosting the total stock to 7.2 million electric cars. As the EV ... Read More
Why Linux Should Factor Into Your Security Strategy
Linux is a pervasive operating system—and for good reason. It’s lightweight, flexible, multi-architecture supportive and open source, all leading to loads of opportunity. Today, Linux-based systems run servers, mainframes, routers, smart cars, cloud workloads and more. Why Linux Linux is scalable, modular, reliable and efficient. It offers a backbone for ... Read More




