Cato Networks shows insecure network protocols persist

Cato Networks recently released its inaugural Cato CTRL SASE Threat Report for Q1 2024. The report reveals that all surveyed organisations persist in using insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across networks.

The Cato CTRL SASE Threat Report Q1 2024, developed by Cato CTRL’s cyber threat intelligence (CTI) research team, offers insights into security threats and their identifying network characteristics for all aggregate traffic, irrespective of its origin or destination on the internet or WAN, and for all endpoints across sites, remote users, and cloud resources.

“As threat actors constantly introduce new tools, techniques, and procedures targeting organisations across all industries, cyber threat intelligence remains fragmented and isolated to point solutions,” said Etay Maor, Chief Security Strategist at Cato Networks and a founding member of Cato CTRL. “Cato CTRL is filling this gap to provide a holistic view of enterprise threats. As the global network, Cato has granular data on every traffic flow from every endpoint communicating across the Cato SASE Cloud Platform, and we’re excited to share what we’ve learned with the broader industry to spark a more secure future.”

The report summarises findings derived from Cato SASE Cloud Platform traffic flows across Cato customers between January and March 2024. Cato CTRL analysed 1.26 trillion network flows and thwarted 21.45 billion attacks. Key findings include:

Enterprises are too trusting within their networks

AI takes the enterprise by storm

Zero-day threats

Many cyber threats are industry-specific

There’s plenty of other editorial on our sister site, Electronic Specifier! Or you can always join in the conversation by commenting below or visiting our LinkedIn page.

Exit mobile version