Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Tips to Build Cloud Cyber Resilience

Cloud cyber resiliency means a company can handle cyberattacks and recover fast to keep its cloud services running. It’s about creating systems that expect issues—like attacks, errors, or technical issues—and act quickly to reduce harm. This ability is now very important because businesses depend more and more on cloud systems to run their work. Factors driving this urgency include: Organizations find it hard to keep up with innovation and flexibility while staying secure.

What Is Cloud Security and How Can It Benefit Your Business?

Implementing cloud security policies and technologies has seen sustained growth in recent years. However, despite the widespread adoption of cloud-based solutions, many companies have yet to fully recognize the critical importance of cloud security or still find themselves wondering: what is cloud security and why should it matter to their business? Migrating to the cloud provides organizations with the agility to move faster and more efficiently.

Cloud Detections in an Age of Cloud Tools with Fred Wilmot

Fred Wilmot, CEO and Co-Founder of Detecteam, joined Defender Fridays to discuss the growing concerns surrounding identity management in cloud security, particularly with the rise of attacks on platforms like O365 and Azure. He emphasizes the importance of analyzing network traffic to understand identity behavior and the complexities introduced by encryption and third-party authentication. He also notes the ongoing evolution in cybersecurity practices and the potential benefits of standardization in logging and taxonomies.

Cloudflare named a Strong Performer in Email Security by Forrester

Today, we are excited to announce that Forrester has recognized Cloudflare Email Security as a Strong Performer and among the top three providers in the ‘current offering’ category in “The Forrester Wave: Email, Messaging, And Collaboration Security Solutions, Q2 2025” report. Get a complimentary copy of the report here. According to Forrester.

Verifying Bots and Agents with Cryptography in the Age of AI

In this episode, host João Tomé is joined in Cloudflare’s Lisbon office by our Senior Research Engineer Thibault Meunier to explore a new proposal that could reshape how bots interact with the web in the age of AI. Timestamps: We go into Cloudflare’s proposal of using cryptographic signatures for bots, enabling websites to verify their identity. Why is this important? As AI systems rely increasingly on online content, this standard could help build a better relationship between content creators and AI platforms.

Performance measurements... and the people who love them

Principal Engineer Kevin Guthrie walks us through his blog post, “Performance measurements… and the people who love them,” which explores how teams can better measure, visualize, and communicate web performance—beyond just raw metrics. Part of the “This Week in NET” show/podcast.

CrowdStrike Named a Frost Radar Leader in Cloud and Application Runtime Security

CrowdStrike has been named an innovation and growth Leader in the inaugural 2025 Frost Radar: Cloud and Application Runtime Security (CARS), positioned highest on the Innovation Index among all vendors evaluated. This marks another milestone in our mission to stop breaches with the industry's most unified and comprehensive cloud runtime protection.

How implementing PAM in multi-cloud secures your hybrid IT

Modern IT is innately complex, which leads to matching complexity in the security environment and indeed for managing privileged accounts. Companies rely on multi-cloud and hybrid cloud deployments to get more flexibility and to enhance resilience. But the flipside of a distributed, decentralized IT approach is a variety of security models across platforms. That creates a broad attack surface, and a complex web of privileged accounts.

Each Cloud Incident Tells a Different Story - Listen, Act, Win

Let’s be honest. Most cloud security alerts feel like trying to read a book with half the pages missing. You get bits and pieces — “unusual login,” “suspicious process,” “network traffic spike” — but no real explanation of what actually happened or what you should do about it. That’s the daily reality for security teams. You’re not just fighting attackers; you’re fighting for context.

Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla

Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them.