Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to secure cloud workloads without building a full-scale SOC

You don’t need a 20-person SOC to protect your cloud-native environment. What you need is the right strategy: map your risk, embed security early, automate detection, and let smart tooling do the heavy lifting. Here’s how security and DevOps leaders with limited resources can achieve enterprise-level protection without enterprise-level headcount.

More Cores, Less Cache - And It Still Got Faster | Cloudflare Gen 13

In this episode of This Week in NET, JQ Lau and Victor Hwang from our Network & Infrastructure Strategy team walk us through Cloudflare's 13th generation of servers — the machines that power a significant part of the internet across 330+ cities worldwide. The Gen 13 program doubled compute density by jumping from 96 to 192 cores, but that came with an 83% drop in L3 cache. The team explains how a bold hardware bet, combined with Cloudflare's FL2 Rust-based software rewrite, turned that trade-off into a win across throughput, latency, and power efficiency.

CyberPhysical Security: Protecting the Modern EV Charging Perimeter

Electric vehicles have crossed from niche technology into mainstream infrastructure. Charging networks now form a critical layer of both the energy grid and the transportation system, and attackers have noticed. EV charging sits at a three-way intersection of cloud software, operational technology, and automotive systems. Each domain has its own threat model, its own tooling, and its own team assuming someone else owns the risk. That gap is where adversaries operate.

Trusted IT Services and IT Support in Philadelphia, PA for Modern Businesses

In today's digital-first economy, technology is no longer just a support function-it is the foundation of every successful business. From communication and data storage to cybersecurity and cloud systems, organizations rely heavily on IT infrastructure to operate efficiently and stay competitive.

Sales Is a Math Problem | Vinti Batiste, VP of Enterprise Sales at Cloudflare

In this episode of This Week in NET, Vinti Batiste, VP of Sales for US Enterprise at Cloudflare, shares her 30-year journey across IBM, Cisco, and now Cloudflare — and what it really means to be in enterprise sales. Vinti talks about growing Cloudflare's enterprise business 80% year over year, the moment Michelle Zatlyn walked into her first all-hands, how she uses AI to prepare for customer meetings, and why sales is really a math problem.

Top Tools Used to Bypass Cloudflare for Web Scraping: A Security Perspective

Cloudflare protects more than 20% of all websites on the internet, according to W3Techs infrastructure data. Its layered security model combines IP reputation filtering, TLS fingerprinting, JavaScript challenges and behavioural analysis to block automated traffic before it reaches the origin server.

Shutdowns, power outages, and conflict: a review of Q1 2026 Internet disruptions

In the first quarter of 2026, government-directed shutdowns figured prominently, with prolonged Internet blackouts in both Uganda and Iran, a stark contrast to the lack of observed government-directed shutdowns in the same quarter a year prior. This quarter, we also observed a number of Internet disruptions caused by power outages, including three separate collapses of Cuba's national electrical grid.

Compliance in the Cloud: Navigating B2B Telecom Security

B2B security in the cloud is changing fast for companies in every industry. Businesses need to keep their data safe while staying connected to clients and partners across the globe. Modern telecom systems offer more than just simple voice calls or messaging. They provide a foundation for growth and meeting strict legal rules in a digital world.

CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms

We're proud to announce that Frost & Sullivan has named CrowdStrike a Leader for the fourth consecutive time in the 2026 Radar for Cloud-Native Application Protection Platforms. This recognition validates our continued investment in combining posture management with real-time detection and response, and reinforces our leadership in stopping cloud attacks.