Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud security vs. traditional security

Data protection principles are the same whether your data sits in a traditional on-premises data center or a cloud environment. However, the way you apply those principles is quite different when it comes to cloud security vs. traditional security. Moving data to the cloud – whether it's a public cloud like AWS, a private cloud or hybrid cloud — introduces new attack surfaces, threats and challenges, so you need to approach security in a new way.

Beyond Compliance: Secure Your Business in the Cloud with Falcon Cloud Security

Cloud infrastructure is subject to a wide variety of international, federal, state and local security regulations. Organizations must comply with these regulations or face the consequences. Due to the dynamic nature of cloud environments, maintaining consistent compliance for regulatory standards such as CIS, NIST, PCI DSS and SOC 2 benchmarks can be difficult, especially for highly regulated industries running hybrid or multi-cloud infrastructures.

How Cloudflare's AI WAF proactively detected the Ivanti Connect Secure critical zero-day vulnerability

Most WAF providers rely on reactive methods, responding to vulnerabilities after they have been discovered and exploited. However, we believe in proactively addressing potential risks, and using AI to achieve this. Today we are sharing a recent example of a critical vulnerability (CVE-2023-46805 and CVE-2024-21887) and how Cloudflare's Attack Score powered by AI, and Emergency Rules in the WAF have countered this threat.

Understanding the human-centered approach for cloud network security with GigaOm's 2024 insights

2024 just started but cloud network security insights are already emerging. Amongst all the research and insights GigaOm’s comprehensive research emerges as a vital compass. More than just a collection of data and trends, it’s a beacon for us – the decision-makers and thought leaders – guiding us to navigate these challenges with a focus on the human element behind the technology. GigaOm showcased indicators to where the market is heading.

Your Complete Guide to Cloud Security Architecture

In today’s digital world, is your data 100% secure? As more people and businesses use cloud services to handle their data, vulnerabilities multiply. Around six out of ten companies have moved to the cloud, according to Statista. So keeping data safe is now a crucial concern for most large companies – in 2022, the average data leak cost companies $4.35 million. This is where cloud security architecture comes in.

Essential Cloud Security Tools for Effective DevSecOps

Implementation of a DevSecOps approach is the most impactful key factor in the total cost of a data breach. Successful DevSecOps in a cloud-native world is aided by the right tools. Here are a handful of the most essential cloud security tools and what to look for in them to aid DevSecOps.

Understanding configuration management with Vanta and AWS

This blog is part of a series about how to use Vanta and AWS to simplify your organization’s cloud security. To learn more about how to use Vanta and AWS, watch our Coffee and Compliance on-demand webinar. ‍ Amazon Web Services, or AWS, is one of the most popular cloud providers for organizations today — providing one of the most flexible and secure cloud environments available.

Integrating JFrog Artifactory with Amazon SageMaker

Today, we’re excited to announce a new integration with Amazon SageMaker! SageMaker helps companies build, train, and deploy machine learning (ML) models for any use case with fully managed infrastructure, tools, and workflows. By leveraging JFrog Artifactory and Amazon SageMaker together, ML models can be delivered alongside all other software development components in a modern DevSecOps workflow, making each model immutable, traceable, secure, and validated as it matures for release.