Industry Spotlight

Razy

How to Spot Razy Malware Undetected By AV Systems

Examining traffic patterns can help spot malware such as Razy on users’ systems Note: Periodically, security researchers on the Cato Networks Research Lab publish internal findings gained while hunting threats on customer networks. These are security insights driven by networking data—something that’s only become practical with the convergence of networking ... Read More
quantum

Why It’s Time to Quantum-Proof Your Communications Infrastructure

It’s a matter of time until the day arrives when quantum computers will crack traditional encryption. This moment, often referred to as “Y2Q,” may be as little as three to five years away, given the billions of dollars of investment flowing into the field. While we can’t be sure of ... Read More
cloud

Cloud Compliance Doesn’t Equal Security

Despite continuous adherence to regulations, many organizations still fall prey to attacks. Ever since the cloud became the de facto infrastructure choice for forward-thinking organizations, it has enabled organizations of all sizes and types to scale and transform in ways they never imagined possible. But for all its benefits, the ... Read More
WFH

Now’s the Time to Revisit WFH Cybersecurity

It’s been more than eight or so months since the COVID-19 pandemic and the need for social distancing forced companies throughout the U.S. to rethink the way they do business, closing down offices and sending millions of employees to work from home. In fact, 67% of respondents to a recent ... Read More
multi-tool

Maintaining Governance and Security in Multi-Tool Environments

The massive shift to hybrid cloud architectures means enterprises are choosing a multi-tool approach to IT. However, the new multi-tool world inevitably creates security and governance challenges. The more tools you add, the more complicated things get. Each new tool requires comprehensive integrations to fit into your stack and access ... Read More
online voting

Online Voting: 3 Reasons Why It’s Not Possible (Yet)

The coronavirus pandemic has upended our way of life. As millions of Americans practice social distancing, restaurant and grocery deliveries have soared. Children are attending school online via conferencing apps. Adults are enjoying virtual happy hours with friends. And a record number of corporate employees are working remotely. Given all ... Read More
healthcare

A Smarter Security Strategy for Healthcare Risks

In late October the FBI issued an alert regarding imminent and increased advanced ransomware risk to hospitals and healthcare providers in the U.S. Such attacks had already affected five hospitals that week. This is just the latest in a string of headlines regarding cyberattacks against the healthcare sector. Others include ... Read More
ZTNA

Implementing ZTNA: 4 Reasons Why Mobile is a Good Place to Start

ZTNA is a good fit for today’s remote workforce, and mobile is a perfect landscape to implement a ZTNA strategy Sitting behind a desk in an office is quickly becoming a thing of the past. Let’s not forget, even before the pandemic, a huge percentage of the workforce (70%, according ... Read More
electric vehicle

Security Essential as Electric Vehicles Accelerate

The electric vehicle (EV) market continues to expand at a rapid pace and demonstrated strong year-over-year growth before the pandemic emerged. According to a recent survey by IEA, sales of electric cars topped 2.1 million globally in 2019, boosting the total stock to 7.2 million electric cars. As the EV ... Read More
Linux

Why Linux Should Factor Into Your Security Strategy

Linux is a pervasive operating system—and for good reason. It’s lightweight, flexible, multi-architecture supportive and open source, all leading to loads of opportunity. Today, Linux-based systems run servers, mainframes, routers, smart cars, cloud workloads and more. Why Linux Linux is scalable, modular, reliable and efficient. It offers a backbone for ... Read More