Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Choose the Right Cloud DDoS Solution for Enterprise Security

Enterprise DDoS attacks reached critical levels in 2025, with authoritative reports documenting unprecedented attack volumes and sophistication. Global cybercrime costs are projected to reach $10.5 trillion annually by 2025, representing the greatest transfer of economic wealth in history. Selecting the wrong cloud DDoS protection creates operational disruption, compliance violations, and irreversible business damage.

AI Learning: It's copying everything we do!!! | AI Avenue: Ep 4

Don’t you hate it when your robot hand co-host tries to hijack your show? Yorick makes his OWN version of AI Avenue, prompting a conversation about ethics and learning in AI. Craig reaches out to experts like Amanda Haskell from @anthropic-ai to discuss how we can all use AI more responsibly. AMECA from @EngineeredArtsLtd makes a cameo to get Yorick in line. And Nick from @heygen_official swings by to make a new Craig Avatar, ethically.

Vanta signs a strategic collaboration agreement with AWS to deepen integration

We’re thrilled to announce that Vanta has signed a strategic collaboration agreement (SCA) with Amazon Web Services (AWS) to make it even easier for businesses to scale securely in the cloud. We’re expanding the reach of our compliance automation and trust management platform, enabling organizations to build stronger security programs, accelerate audit readiness, and demonstrate compliance more efficiently—all while scaling on AWS. ‍

Securing The Future: Cloudflare's Implementation of Post-Quantum Cryptography - Michiel Appelman

Explore how Cloudflare’s Post-Quantum Cryptography (PQC) capabilities are future-proofing enterprise security. Learn how we’re integrating PQC across our network to safeguard data against quantum threats, ensuring businesses stay protected in an evolving cryptographic landscape—without compromising performance or scalability.

CTEM Solutions Explained How to Build a Stack

Vulnerability numbers are spiraling. Compliance checklists and point scans cannot keep pace. Continuous Threat Exposure Management (CTEM) provides security leaders with a practical approach to identify and mitigate real attack paths in real-time. This article explains what CTEM is, the solutions that enable it, and how to build a stack that actually shrinks exposure instead of counting it. CTEM solves the eternal problem of vulnerability management (too many vulnerabilities to ever fix) with a continuous program to find, validate, and reduce exposures before adversaries can use them.

OCSF for Security Hub: Sumo Logic and AWS speaking the same language

In technology, the proof of a lasting relationship is in the infrastructure — the pipelines, security services, and log plumbing have to work seamlessly together long before anyone sees the outcome. That’s precisely what Sumo Logic and AWS have built. Aligned around open standards like OCSF (Open Cybersecurity Schema Framework), integrated with services like Security Hub and GuardDuty, and connected through shared telemetry, it makes cloud security and observability possible at scale.