Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

How we think about Zero Trust Performance

Cloudflare has done several deep dives into Zero Trust performance in 2023 alone: one in January, one in March, and one for Speed Week. In each of them, we outline a series of tests we perform and then show that we’re the fastest. While some may think that this is a marketing stunt, it’s not: the tests we devised aren’t necessarily built to make us look the best, our network makes us look the best when we run the tests.

The Basics of Cloud Security Glossary

What is it: Agentless architecture refers to platforms and services that are built to run as cloud-native applications. They require no installation, patching, or other forms of long term upkeep on the part of a user. Why it matters: Agentless applications, especially agentless security applications have a lower total cost of ownership (TCO), in terms of man-hours saved in deployment, maintenance, and overhead.

Spotlight on Zero Trust: We're fastest and here's the proof

In January and in March we posted blogs outlining how Cloudflare performed against others in Zero Trust. The conclusion in both cases was that Cloudflare was faster than Zscaler and Netskope in a variety of Zero Trust scenarios. For Speed Week, we’re bringing back these tests and upping the ante: we’re testing more providers against more public Internet endpoints in more regions than we have in the past.

Case study: Calico helps Upwork migrate legacy system to Kubernetes on AWS and enforce zero-trust security

Upwork is a freelancing platform that connects a global base of clients to freelancers via job postings. Since going public on the New York Stock Exchange in 2019, the company has become one of the leading freelance platforms worldwide and was named on Time’s list of the 100 Most Influential Companies of 2022.

Cloud security study reveals: over 50% of system failures are caused by human error and mismanagement

The past few years have witnessed a rapid surge in the use of SaaS applications across various industries. But with this growth comes a significant challenge: managing security and assessing risk in application connectivity.

Integrated cloud email security (ICES) vs secure email gateway (SEG)

Cybercriminals continually evolve their techniques, leading to more successful phishing attacks. Using techniques such as text-based attacks that utilize social engineering and highly targeted spear phishing, bad actors are able to bypass traditional email security and land in their target’s inbox. According to the organizations surveyed for the 2023 Email Security Risk Report, 92% fell victim to phishing attacks.

Overview of AWS IAM Best Practices

In the ever-evolving landscape of cloud security, AWS Identity and Access Management (IAM) plays a critical role in safeguarding your AWS resources. By following IAM best practices, you can fortify your cloud environment, mitigate risks, and maintain granular control over access permissions. In this quick guide, we will review essential IAM best practices, from implementing least privilege to leveraging advanced features.

Chris Farris - Unblurring The Lines In Cloud Security

00:00 Intro: welcome Chris!

03:05 Trends in cloud security, reflected at fwd:cloudsec

05:00 fwd:cloudsec submissions - more practitioners needed!

10:40 Blurring the lines: what does that practically means?

19:30 Cloud service providers maturity: their security posture evolved

24:30 Public Cloud Security Breaches

30:01 Public Cloud Security Breaches demo

32:35 the Last Pass attack deep dive

38:00 Identify the crown jewels!