Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Hybrid Work and Cloud Adoption Are Changing Enterprise Ransomware Risk

Five years ago, enterprise ransomware risk was mostly a perimeter problem. Today it’s an identity problem, a visibility problem, and a cloud configuration problem, all at once. Hybrid work and cloud adoption didn’t just shift where people work. They fundamentally changed where ransomware attacks begin, how far they reach, and how long they go undetected.

What Is SASE? And How Is It Different From A VPN?

Many companies are used to the idea of operating a virtual private network (VPN), but SASE is becoming much trendier lately. It's changing the way companies work and fundamentally rewriting their security architecture. So, what exactly is SASE, and how can it help your business?

Beyond the Blind Spot: Achieving Data Mastery with Netskope at Currys

You can’t control what you can't see. Currys is fixing this, using data analytics and data stitching to correlate information across various endpoints to create a holistic view of its cloud environment. Netskope provides the core technology and DLP engine that powers Currys data protection strategy. Together, they built a mature data loss prevention (DLP) strategy, a model which is user-centric, allowing the business to drill into specific user behaviors rather than just focusing on applications.

How Cloudflare responded to the "Copy Fail" Linux vulnerability

On April 29, 2026, a Linux kernel local privilege escalation vulnerability was publicly disclosed under the name "Copy Fail" (CVE-2026-31431). Cloudflare’s Security and Engineering teams began assessing the vulnerability as soon as it was disclosed. We reviewed the exploit technique, evaluated exposure across our infrastructure, and validated that our existing behavioral detections could identify the exploit pattern within minutes.

How to Harden AI Agents in Cloud Environments: The 9 Capabilities Your Stack Must Provide

Most “hardening” advice for AI agents is a checklist of things to configure before the agent runs. CIS Kubernetes Benchmark gates. Pod Security Standards baselines. NetworkPolicy templates. None of it’s wrong — it’s just one of four phases, the one your stack already covers. The other three are Observe, Enforce, and Reconcile. They’re where AI agents actually get breached, and they’re where most stacks have nothing.

Why WatchGuard Acquired Perimeters.io: Making Cloud Security Work for MSPs

If you ask any MSP what they use to protect their clients’ cloud environments, you will get one of two answers. Either they’ll point to the native security tools built into platforms like Microsoft 365 or Google Workspace. Or they’ll describe a patchwork of different products stitched together to cover identity, configuration, and SaaS visibility. Neither approach is ideal. But both reflect the reality MSPs are working with today.

When DNSSEC goes wrong: how we responded to the .de TLD outage

On May 5, 2026, at roughly 19:30 UTC, DENIC, the registry operator for the.de country-code top-level domain (TLD), started publishing incorrect DNSSEC signatures for the.de zone. Any validating DNS resolver receiving these signatures was required by the DNSSEC specification to reject them and return SERVFAIL to clients, including 1.1.1.1, the public DNS resolver operated by Cloudflare. The country-code top-level domain for Germany, .de, is one of the largest on the Internet.