Published on June 10th, 2024
Threat actors are continually evolving, yet Cyber Threat Intelligence (CTI) often remains siloed within individual point solutions.
To truly understand the cybersecurity landscape, organizations must adopt a holistic approach, integrating external data, inbound and outbound threats, and network activity analysis.
Cato’s Cyber Threat Research Lab (Cato CTRL) has unveiled its inaugural SASE threat report, providing a comprehensive perspective on enterprise and network threats.
Leveraging Cato’s robust network analysis capabilities, this report offers valuable insights derived from extensive data sources.
Understanding The Report
The SASE Threat Report offers insights across strategic, tactical, and operational dimensions, utilizing the MITRE ATT & CK framework.
It encompasses analysis of malicious and suspicious activities, along with examination of applications, protocols, and tools operating within networks.
Data Sources
Drawing from a wealth of resources, including granular traffic flow data from every endpoint within the Cato SASE Cloud Platform, hundreds of security feeds, proprietary ML/AI algorithms, and human intelligence, the report presents a comprehensive view of enterprise security activity.
Key Statistics
Cato’s data pool comprises information gathered from over 2200 customers, encompassing 1.26 trillion network flows and thwarting 21.45 billion attacks.
This extensive dataset provides unparalleled insights into cybersecurity trends and threats.
Unveiling Cato CTRL
Cato CTRL, the Cyber Threat Research Lab, represents a pioneering blend of human intelligence and advanced network analysis capabilities.
With a team comprising former military intelligence analysts, researchers, data scientists, and industry professionals, Cato CTRL delivers unparalleled threat insights.
Role Of Cato CTRL
Cato CTRL serves various stakeholders within organizations, providing tactical data for Security Operations Centers (SOCs), operational threat intelligence for managers, and strategic briefings for management and board members.
Moreover, it monitors security industry trends, informing the creation of the SASE Threat Report.
The Cato CTRL SASE Threat Report’s Top 8 Findings
With its unique blend of human expertise and advanced analytics, the SASE Threat Report by Cato CTRL offers a deep dive into the evolving cybersecurity landscape.
Key Terms Explained
MITRE ATT&CK Framework for Threat Detection
What it is: A globally recognized knowledge base that categorizes cyber adversary tactics, techniques, and procedures (TTPs).
How it helps:
- Provides a common language for describing threats.
- Helps organizations understand what attackers are trying to achieve and how they do it.
- Enables security teams to map their defenses to known TTPs.
- Cato CTRL likely uses this framework to categorize the threats they identified in their report.
Securing Legacy Protocols
What are legacy protocols?
Communication protocols that have been around for a long time and may not have the latest security features. (e.g., HTTP, Telnet, SMB)
Why are they a challenge?
These protocols were often designed before cybersecurity was a major concern. They may have vulnerabilities that attackers can exploit.
Securing them:
- Patching regularly for known vulnerabilities.
- Disabling them if they are not essential.
- Using encryption and other security controls when necessary.
AI-Powered Threat Hunting
What it is: The use of Artificial Intelligence and Machine Learning algorithms to proactively search for signs of malicious activity within a network.
How it works:
- Analyzes large amounts of data from various sources (logs, network traffic, etc.)
- Identifies patterns and anomalies that might indicate a potential threat.
- Helps security analysts focus their efforts on investigating suspicious activity.
Secure DNS Implementation
What is DNS?
The Domain Name System translates human-readable website names (like [invalid URL removed]) into machine-readable IP addresses.
What is DNSSEC?
An extension to the DNS protocol that adds security features to help prevent DNS spoofing attacks.
Benefits of Secure DNS:
- Protects against DNS hijacking and other attacks.
- Improves the overall security of internet browsing.
- Cato CTRL’s report suggests low adoption despite these benefits.