Anzeige
Mehr »
Dienstag, 03.06.2025 - Börsentäglich über 12.000 News
Gestern Kursverdopplung durch Uran-Hoffnung - zündet jetzt der nächste Vervielfacher?
Anzeige

Indizes

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Aktien

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Xetra-Orderbuch

Fonds

Kurs

%

Devisen

Kurs

%

Rohstoffe

Kurs

%

Themen

Kurs

%

Erweiterte Suche
PR Newswire
253 Leser
Artikel bewerten:
(1)

Cato Networks to Highlight AI, Defense-in-Depth Techniques, and Cloud Risks in Six Upcoming Talks

Cato CTRL to present technical research and practical use cases that showcase innovative security approaches and reinforce industry best practices

TEL AVIV, Israel, May 29, 2024 /PRNewswire/ -- Cato Networks, the SASE leader, today announced that Cato CTRL, Cato's cyber threat intelligence (CTI) research team, will showcase new innovations and insights at five upcoming conferences. The presentations will span new uses of AI to address pressing problems involving IoT-based attacks and data loss, defense-in-depth (DiD) techniques for stopping the most common types of attacks, and novel security risks posed by the cloud.

"Stopping today's threats requires a deep understanding of the threat landscape and the resources available to stop them," says Elad Menahem, vice president of research at Cato Networks and member of Cato CTRL. "The insights showcased by the Cato CTRL team are the result of cutting-edge AI research, our in-depth security expertise, and the unique insight offered by the Cato SASE Cloud platform."

How to Stop IoT-based Attacks and Use AI to Prevent Sensitive Data Loss

At SharkFest '24 US in Fairfax, Virginia, Asaf Fried, data science team leader at Cato Networks and member of Cato CTRL, will present on "Passive Fingerprinting Methods for IoT Profiling"(June 19 at 11:45 a.m.; all session times are in local times). IoT has revolutionized how we live and work, but it has also created significant challenges for network security and asset management. Most businesses have a blind spot for IoT devices, which creates an opportunity for attackers. This talk will show how to identify unknown IoT devices using passive fingerprinting. devices using AI algorithms for passive fingerprinting.

At the Secure AI Summit in Seattle, Fried will again present, discussing "Using Large Language Models to Improve Data Loss Prevention in Organizations" (June 25 at 3:35 p.m.). As data loss prevention (DLP) has moved to the cloud, the technology is becoming a key tool among enterprises for enforcing personal identifiable information (PII) standards. With the development of natural language processing (NLP) and, more specifically, large language models (LLM), DLP can be more accurate. In this talk, Fried will discuss the shortcomings of traditional DLP engines in detecting sensitive file categories and how LLMs can help.

The Attack You Already Know Might the Most Dangerous

At BSIDES Barcelona, Matan Mittelman, security content technical leader at Cato Networks and member of Cato CTRL, will present "Stop Chasing APT Headlines & Start Covering Your Bases" (May 30 at 15:00 p.m.). After analyzing 1.26 trillion network flows and blocking 21.45 billion attacks, Cato CTRL discovered that the most common breaches stem not from new zero-day attacks but often from long-reported vulnerabilities, such as Log4J, with known tools. In this talk, Mittelman will demonstrate a real attack scenario, from initial access to lateral movement to exfiltration, and analyze the differences between network and endpoint security.

Missed Mittelman in Barcelona? Catch Avishay Zawoznik, security research manager at Cato Networks and member of Cato CTRL, presenting a similar talk at OWASP Global AppSec Lisbon 2024. In "Start Covering Your Bases & Stop Chasing APT Headlines" (June 27 at 13:15 p.m.), Zawoznik will showcase a "run-of-the-mill" simulation of a network breach, illustrating that despite cognitive biases towards recent technical trends, most breaches occur through well-known methods. Utilizing public digital forensics and incident response (DFIR) reports, the MITRE ATT&CK Framework, and common hacking tradecraft, he'll highlight the importance of defense-in-depth strategies and network controls in thwarting attacks.

The Cloud: The Risks You Never Knew

During the Rocky Mountain Information Security Conference (RMISC) in Denver, Etay Maor, the Chief Security Strategist at Cato and Member of Cato Control, will speak twice as part of the Security Management track. In "AI: Fact, Fiction, and Friction" (June 13 at 9:15 a.m.), Maor will review the misconceptions surrounding AI, covering the various models and how they can be used by cybersecurity professionals and threat actors, and they fail and hallucinate. He'll also dive into Russian underground chats and show what threat actors are saying about AI.

In "Cloudy with a Chance of Cyberattacks" (June 13 at 11:00 a.m.), Maor will dive into the risks the cloud is posing as a platform for cyberattacks. He will discuss the techniques and demo Living off the Cloud attacks and mitigation strategies. The session will cover how malware operators are now moving their infrastructure to legitimate cloud-based services. Maor will show how attackers exfiltrate data using these services and present a three-layer approach to defend against these threats.

Cato CTRL: The SASE Cyber Threats Research Lab

Cato CTRL (Cyber Threats Research Lab) is the world's first CTI group to fuse threat intelligence with granular network insight made possible by Cato's AI-enhanced, global SASE platform. By bringing together dozens of former military intelligence analysts, researchers, data scientists, academics, and industry-recognized security professionals, Cato CTRL combines the best in human intelligence with the best in network and security insight to shed light on the latest cyber threats and threat actors.

To speak with a Cato CTRL security leader for a press interview, contact press@catonetworks.com. To learn more about Cato CTRL visit https://www.catonetworks.com/cato-ctrl/.

About Cato Networks

Cato Networks is the leader in SASE, delivering enterprise security and networking in a single cloud platform. With Cato, organizations replace costly and rigid legacy infrastructure with an open and modular SASE architecture based on SD-WAN, a purpose-built global cloud network, and an embedded cloud-native security stack.

Want to learn why thousands of organizations secure their future with Cato? Visit us at www.catonetworks.com.

Resources

Photo of Asaf Fried
Photo of Avishay Zawoznik
Photo of Elad Menahem
Photo of Etay Maor
Photo of Matan Mittelman

Cision View original content:https://www.prnewswire.co.uk/news-releases/cato-networks-to-highlight-ai-defense-in-depth-techniques-and-cloud-risks-in-six-upcoming-talks-302157021.html

© 2024 PR Newswire
Die USA haben fertig! 5 Aktien für den China-Boom
Die Finanzwelt ist im Umbruch! Nach Jahren der Dominanz erschüttert Donald Trumps erratische Wirtschaftspolitik das Fundament des amerikanischen Kapitalismus. Handelskriege, Rekordzölle und politische Isolation haben eine Kapitalflucht historischen Ausmaßes ausgelöst.

Milliarden strömen aus den USA – und suchen neue, lukrative Ziele. Und genau hier kommt China ins Spiel. Trotz aller Spannungen wächst die chinesische Wirtschaft dynamisch weiter, Innovation und Digitalisierung treiben die Märkte an.

Im kostenlosen Spezialreport stellen wir Ihnen 5 Aktien aus China vor, die vom US-Niedergang profitieren und das Potenzial haben, den Markt regelrecht zu überflügeln. Wer jetzt klug investiert, sichert sich den Zugang zu den neuen Wachstums-Champions von morgen.

Holen Sie sich den neuesten Report! Verpassen Sie nicht, welche 5 Aktien die Konkurrenz aus den USA outperformen dürften, und laden Sie sich das Gratis-PDF jetzt kostenlos herunter.

Dieses exklusive Angebot gilt aber nur für kurze Zeit! Daher jetzt downloaden!
Werbehinweise: Die Billigung des Basisprospekts durch die BaFin ist nicht als ihre Befürwortung der angebotenen Wertpapiere zu verstehen. Wir empfehlen Interessenten und potenziellen Anlegern den Basisprospekt und die Endgültigen Bedingungen zu lesen, bevor sie eine Anlageentscheidung treffen, um sich möglichst umfassend zu informieren, insbesondere über die potenziellen Risiken und Chancen des Wertpapiers. Sie sind im Begriff, ein Produkt zu erwerben, das nicht einfach ist und schwer zu verstehen sein kann.