Security | Threat Detection | Cyberattacks | DevSecOps | Compliance


DDoS report Q1 2024, certificate changes, QR phishing, and more

In this week's episode, we discuss different topics from blogs that we published in the previous couple of weeks, right after our Developer Week 2024. Host João Tomé is joined by our Field CTO, Trey Guinn, based in San Francisco. We discuss our most recent DDoS threat report for Q1 2024, highlighting the continued increase in DDoS attacks and emerging trends. Additionally, we address Cloudflare's efforts to ensure our customers aren't affected by Let's Encrypt's certificate chain change, emphasizing the importance of certificates.

Azure Key Vault vs HashiCorp Vault: Comparison

With so many organizations moving to cloud-based infrastructures, the need for security management has become more essential than ever. Azure Key Vault and HashiCorp Vault are two leading cloud solutions for safeguarding sensitive information. While both of them are used for managing secrets, their approaches, features, and integrations can differ significantly, which we are going to discuss in this blog.

Azure Key Vault vs CyberArk: Comparison to Know

What comes to your mind when you think of a secret? To protect it in whichever manner you could, right? In the real-world scenario, it’s our nature and our self-control how we can manage our secrets and protect them but matter gets different when it comes to the virtual world. In the virtual world, a secret is anything that you aim to rigidly control access to, such as passwords, tokens, API & encryption keys, or certificates.

Cloudflare named in 2024 Gartner Magic Quadrant for Security Service Edge

Gartner has once again named Cloudflare to the Gartner® Magic Quadrant™ for Security Service Edge (SSE) report1. We are excited to share that Cloudflare is one of only ten vendors recognized in this report. For the second year in a row, we are recognized for our ability to execute and the completeness of our vision. You can read more about our position in the report here.

Unleashing Innovation: The Dynamics of SaaS Development Agencies

In today's rapidly evolving business landscape, agility and scalability are paramount. Traditional software models often struggle to meet the dynamic demands of modern enterprises. Enter Software as a Service (SaaS), a game-changing paradigm that offers flexible, subscription-based solutions accessible via the cloud. SaaS applications empower businesses to streamline operations, enhance productivity, and adapt to market shifts with ease.

How Cloudflare Cloud Email Security protects against the evolving threat of QR phishing

In the ever-evolving landscape of cyber threats, a subtle yet potent form of phishing has emerged — quishing, short for QR phishing. It has been 30 years since the invention of QR codes, yet quishing still poses a significant risk, especially after the era of COVID, when QR codes became the norm to check statuses, register for events, and even order food.

What it takes to do Cloud Detection & Response

A guest post by James Berthoty the founder of Latio Tech. The shift to cloud has meant an explosion in cloud security-related acronyms – so many that it can be difficult to know what you currently have versus what’s missing or available. First we bought CSPMs (Cloud Security Posture Management), then CWPPs (Cloud Workload Protection Platforms), then CNAPPs (Cloud Native Application Protection Platform), then CDRs (Cloud Detection Response), and now KDRs (Kubernetes Detection Response).

Five Reasons to Prioritize Application Modernization on AWS

Today, every organization has significant investments in their overall tech stack, both financially and operationally, and as technology evolves, it is crucial that we keep pace to ensure success. For many organizations, legacy applications house some of their most mission critical applications, and replacing or retiring them would be incredibly costly, monetarily and in terms of productivity. With application modernization, businesses can now skip the hassle of completely rebuilding applications.