Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Zero-Trust Audit: Protecting Financial Intelligence in the Cloud

Digital finance is shifting away from the old way of securing data. The old method relied on a strong perimeter to keep threats out. Once someone was inside the network, they often had free rein to move around. Cloud systems make that perimeter vanish because data moves between different apps and users constantly.

12 Cloud Outages With Catastrophic Effects

There’s no infrastructure that’s always on and immune to all kinds of threats. Even the top providers leave a tiny margin in their Service Level Agreements (SLA), stating 99.999% uptime at most. The cloud, advertised as the universal cure for the problems of legacy on-premises setups, also turned out vulnerable. The most obvious and impactful manifestations of cloud vulnerability are cloud outages.

Quantum Computers Threaten Encryption - Here's the Fix | Sharon Goldberg

What happens to Internet security when quantum computers become powerful enough to break today’s encryption? In this clip from a full conversation on This Week in NET, Sharon Goldberg explains why researchers and companies are preparing for post-quantum cryptography, what could be at risk if current encryption is broken, and why the timeline may be closer than many expected. This clip is from the This Week in NET podcast about the future of encryption, quantum computing, and post-quantum cryptography.

The Cloud Goes Dark: Can Your SecOps Stack Survive a Regional Outage?

When nation states target cloud infrastructure, MSSPs are at risk. Many security teams have quietly accepted this as someone else's problem. It isn't, and ignoring the problem only increases their risk exposure. A recent episode of the Cybersecurity Defenders Podcast featured a conversation on cloud infrastructure vulnerability between LimaCharlie Co-Founder Christopher Luft and Prophet Security R&D Guru, Matt Bromiley.

What AWS Transform Means for Your Application Modernization Strategy

Technical debt costs US enterprises an estimated $2.41 trillion per year, according to Accenture research cited by AWS. For most organisations, roughly 30% of engineering time gets absorbed by maintaining legacy systems – work that’s necessary, but produces no new business value. That’s the problem AWS has been trying to solve with AWS Transform, its agentic AI service for enterprise application modernization.

GitProtect 2.2.0: GitHub Enterprise Cloud with Data Residency Backups, AES-GCM Encryption, and More

The huge news is coming: GitProtect is the first solution on the market to support the backup of the GitHub Enterprise Cloud with Data Residency environments. The launch of version 2.2.0 also brings more secure and efficient AES-GCM encryption, a refreshed dashboard, a new onboarding experience, support for Azure DevOps related work links, and much more. Let’s dive into all the new features.

Managed OAuth for Access: make internal apps agent-ready in one click

We have thousands of internal apps at Cloudflare. Some are things we’ve built ourselves, others are self-hosted instances of software built by others. They range from business-critical apps nearly every person uses, to side projects and prototypes. All of these apps are protected by Cloudflare Access. But when we started using and building agents — particularly for uses beyond writing code — we hit a wall. People could access apps behind Access, but their agents couldn’t.

Securing non-human identities: automated revocation, OAuth, and scoped permissions

Agents let you build software faster than ever, but securing your environment and the code you write — from both mistakes and malice — takes real effort. Open Web Application Security Project (OWASP) details a number of risks present in agentic AI systems, including the risk of credential leaks, user impersonation, and elevation of privilege.

Secure private networking for everyone: users, nodes, agents, Workers - introducing Cloudflare Mesh

AI agents have changed how teams think about private network access. Your coding agent needs to query a staging database. Your production agent needs to call an internal API. Your personal AI assistant needs to reach a service running on your home network. The clients are no longer just humans or services. They're agents, running autonomously, making requests you didn't explicitly approve, against infrastructure you need to keep secure.