Search results

The Emerging Role of the BISO

Webinar Overview The BISO (Business Information Security Officer) has a pivotal role – bridging cybersecurity and business goals. Security is no longer just
about protecting the business; it’s aligning security strategy with what matters most to the organization and its growth. BISOs face major challenges in
achieving these goals and desired outcomes, and we’ve identified three key areas they must address: Vendor Management Mitigating risks Managing thr…

Is NGFW Dead? The Rise of FWaaS and Why

Webinar Overview Legacy next-gen firewall (NGFW) appliances were built for a different era—one with static perimeters and on-prem networks. But today’s
enterprises operate in a perimeterless world, where cloud adoption is accelerating, hybrid work is the norm, and IT complexity keeps growing. These
physical NGFWs create constraints, driving up operational overhead while limiting flexibility and scalability. To keep pace with evolving business demands an…

Flying Under the Radar – Security Evasion Techniques (Master Class)

“This is out of scope,” said no hacker ever. Cybercriminals relentlessly aim to breach systems and stay undetected during an attack. In our latest
Cybersecurity Masterclass, Cato experts dive into the evolving tactics of threat actors running malware and phishing campaigns, exploring how they evade
security tools and researchers. We’ll examine the old-school tricks that laid the foundation for today’s sophisticated tactics and examine the modern tech…

The Platform Makes All the SASE Difference

Webinar Overview For decades, security professionals have addressed changes in business requirements and the threat landscape with what they deemed
as the appropriate “point solution”. The so called “best of breed” approach came with significant costs. It increased pressure on IT security budgets, people,
and resources and skills, resulting in a corresponding decline in business agility and responsiveness. Something had to change. Secure Access Service Edg…

Breaking the Mold: 2025 Cyber Threats Outlook (Cyber Security Master Class: Episode 20)

This year, we’ve seen familiar threats take on unexpected forms - from supply chain breaches and AI-driven vulnerabilities to the risks and costs caused by
security complexity. As we head into 2025, understanding these shifts is essential. Join Cato Networks’ Chief Security Strategist and Cato CTRL founding
member, Etay Maor, for a Cybersecurity Masterclass unpacking key lessons from 2024’s most significant and unique breaches, and learn what organization…

Flying Under the Radar – Security Evasion Techniques (Master Class)

“This is out of scope,” said no hacker ever. Cybercriminals relentlessly aim to breach systems and stay undetected during an attack. In our latest
Cybersecurity Masterclass, Cato experts dive into the evolving tactics of threat actors running malware and phishing campaigns, exploring how they evade
security tools and researchers. We’ll examine the old-school tricks that laid the foundation for today’s sophisticated tactics and examine the modern tech…

Breaking the Mold: 2025 Cyber Threats Outlook (Cyber Security Master Class: Episode 20)

This year, we’ve seen familiar threats take on unexpected forms - from supply chain breaches and AI-driven vulnerabilities to the risks and costs caused by
security complexity. As we head into 2025, understanding these shifts is essential. Join Cato Networks’ Chief Security Strategist and Cato CTRL founding
member, Etay Maor, for a Cybersecurity Masterclass unpacking key lessons from 2024’s most significant and unique breaches, and learn what organization…

Unlock the True Value of SASE with Cato SPACE

Webinar Overview When Gartner first defined SASE (Secure Access Service Edge) in 2019, it emphasized a requirement to deliver SASE capabilities from
the cloud. While many SASE vendors claim to meet this requirement, how these capabilities are delivered from the cloud matters. Join our webinar with
Andrea Napoli, Product Marketing Manager at Cato, as he explores the technical and business benefits of the Cato SASE Cloud Platform – a true cloud-nativ…

Breaking the Mold: 2025 Cyber Threats Outlook (Cyber Security Master Class: Episode 20)

This year, we’ve seen familiar threats take on unexpected forms - from supply chain breaches and AI-driven vulnerabilities to the risks and costs caused by
security complexity. As we head into 2025, understanding these shifts is essential. Join Cato Networks’ Chief Security Strategist and Cato CTRL founding
member, Etay Maor, for a Cybersecurity Masterclass unpacking key lessons from 2024’s most significant and unique breaches, and learn what organization…

Flying Under the Radar – Security Evasion Techniques (Master Class)

“This is out of scope,” said no hacker ever. Cybercriminals relentlessly aim to breach systems and stay undetected during an attack. In our latest
Cybersecurity Masterclass, Cato experts dive into the evolving tactics of threat actors running malware and phishing campaigns, exploring how they evade
security tools and researchers. We’ll examine the old-school tricks that laid the foundation for today’s sophisticated tactics and examine the modern tech…