Cybersecurity

3 Things CISOs Achieve with Cato

Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires taking multiple elements into consideration, like cost, complexity, performance and user experience. CISOs around the globe use Cato SSE 360, as part of the Cato SASE Cloud platform to balance these factors without compromise. This article details how […]

Cybersecurity

P2Pinfect – New Variant Targets MIPS Devices – Cado Security | Cloud Forensics & Incident Response

Summary A new P2Pinfect variant compiled for the Microprocessor without Interlocked Pipelined Stages (MIPS) architecture has been discovered This demonstrates increased targeting of routers, Internet of Things (IoT) and other embedded devices by those behind P2Pinfect The new sample includes updated evasion mechanisms, making it more difficult for researchers to dynamically analyse These include Virtual […]

Cybersecurity

Why good email security is essential for business

Threats to email security are on the rise. Without sufficient strategies, companies open themselves, their clients and customers to the consequences of cyber security incidents such as phishing, data breaches and business email compromise (BEC). They must protect this vulnerable asset without compromising its efficiency in communication. These threats to the internal working of the […]