ChaptersEventsBlog
Join Cohesity Catalyst on Tour at the data security and AI summit in NYC, Paris, or Singapore →

Announcements

Announcements
Hypervisor Security in Finance: Why Virtual Infrastructure is a Growing Ransomware Target
Hypervisor Security in Finance: Why Virtual Infrastructure is a Growing Ransomware Target

October 29, 2025

Passwordless Authentication - A Digital Trust Transformation in Combating Credential-Based Attacks
Passwordless Authentication - A Digital Trust Transformation in Combating Credential-Based Attacks

October 28, 2025

What to Know About the EU AI Code of Practice
What to Know About the EU AI Code of Practice

October 20, 2025

Quantum Heist? Not So Fast — How Financial Institutions Can Fight Back
Quantum Heist? Not So Fast — How Financial Institutions Can Fight Back

October 9, 2025

Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents in the SOC

October 6, 2025

From Compliance to Culture: What CISOs Need to Know About Evolving SAT
From Compliance to Culture: What CISOs Need to Know About Evolving SAT

October 1, 2025

Controls vs. Key Security Indicators: Rethinking Compliance for FedRAMP
Controls vs. Key Security Indicators: Rethinking Compliance for FedRAMP

September 23, 2025

An Update on European Compliance: NIS2, CRA, DORA
An Update on European Compliance: NIS2, CRA, DORA

September 17, 2025

Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region
Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region

September 16, 2025

Understanding HIPAA: Key Regulations and Compliance
Understanding HIPAA: Key Regulations and Compliance

September 2, 2025

The Urgent Need for Hypervisor Security in Healthcare
The Urgent Need for Hypervisor Security in Healthcare

August 26, 2025

What Internal Auditors Wish Every Company Knew About SOC 2
What Internal Auditors Wish Every Company Knew About SOC 2

August 25, 2025

A Breakdown of the ISO 27001 Certification Process
A Breakdown of the ISO 27001 Certification Process

August 21, 2025

Looking Back on a Successful Social Engineering Attack: Retool 2023
Looking Back on a Successful Social Engineering Attack: Retool 2023

August 18, 2025

Assets Under Attack: Email Threats Targeting Financial Services Jump 25%
Assets Under Attack: Email Threats Targeting Financial Services Jump 25%

August 13, 2025

Are Your Hypervisors SOC 2 Ready? Why Virtualization Security is Crucial for Compliance
Are Your Hypervisors SOC 2 Ready? Why Virtualization Security is Crucial for Compliance

August 5, 2025

How GenAI Is Reshaping GRC: From Checklists to Agentic Risk Intelligence
How GenAI Is Reshaping GRC: From Checklists to Agentic Risk Intelligence

July 24, 2025

Register Now: Revolutionizing Compliance and Third-Party Governance
Register Now: Revolutionizing Compliance and Third-Party Governance

July 17, 2025

Healthcare Confidential Computing and the Trusted Execution Environment
Healthcare Confidential Computing and the Trusted Execution Environment

July 14, 2025

Watch On-Demand: The CSA Enterprise Authority to Operate (EATO) Framework
Watch On-Demand: The CSA Enterprise Authority to Operate (EATO) Framework

June 30, 2025