Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vulnerability transparency: strengthening security through responsible disclosure

In an era where digital threats evolve faster than ever, cybersecurity isn't just a back-office concern — it's a critical business priority. At Cloudflare, we understand the responsibility that comes with operating in a connected world. As part of our ongoing commitment to security and transparency, Cloudflare is proud to have joined the United States Cybersecurity and Infrastructure Security Agency’s (CISA) “Secure by Design” pledge in May 2024.

Strengthening Cloud Security: API Posture Governance, Threat Detection, and Attack Chain Visibility with Salt Security and Wiz

In the current cloud-centric environment, strong API security is essential. Google's acquisition of Wiz underscores the urgent necessity for all-encompassing cloud security solutions. Organizations should focus on both governing API posture — ensuring secure configuration and deployment to reduce vulnerabilities and assure compliance — and on effective threat detection and response.

Forget IPs: using cryptography to verify bot and agent traffic

With the rise of traffic from AI agents, what’s considered a bot is no longer clear-cut. There are some clearly malicious bots, like ones that DoS your site or do credential stuffing, and ones that most site owners do want to interact with their site, like the bot that indexes your site for a search engine, or ones that fetch RSS feeds.

Turn Shadow IT into a Strategic Advantage with a Business-Led IT Approach

90% of IT admins are worried about shadow IT, but here's the twist. 54% also believe employees use those apps to make their jobs easier. So what if, instead of fearing it, we saw shadow IT as a roadmap to a better workplace? This is business-led IT: collaboration, not control.

The Evolution of Identity

From managing simple passwords to securing complex, cloud-native environments, how has identity management really changed? In this thought-provoking discussion, JumpCloud CEO Rajat Bhargava and CTO Greg Keller are joined by Rak Garg (Bain Capital Ventures), and Francis Odum (The Software Analyst) to challenge conventional thinking. They delve into the tension between usability and security, the risks of vendor lock-in, and the urgent need for identity solutions that can bridge the gap between legacy systems and the dynamic demands of cloud-native environments.

In cybersecurity, it's an arms race.

In cybersecurity, it's an arms race. Stephanie Cohen explained why financial services are prime targets and why strong partnerships are the real armor. Banks are one of the most attacked sectors on the planet. It's not just money at stake; it's entire economies. And here’s the kicker: You're only as strong as your weakest link. Ready to rethink your cybersecurity strategy? Dive into the latest episode of The Connectivity Cloud Podcast.

Continuous Threat Exposure Management (CTEM)

Continuous threat exposure management (CTEM) is a structured framework for continuously assessing, prioritizing, validating, and remediating vulnerabilities across an organization’s attack surface, enabling you to respond effectively to the most pressing threats over an ever-expanding attack surface. Reactive security is a temporary fix, not a sustainable solution.

DDoS Attacks Up 358%: Early 2025 Breakdown with Omer Yoachimik

In this week’s episode, we talk about DDoS attacks and their sharp rise in recent months. We also start with a quick look at some Internet trends tied to the announcement of the new pope. To guide us through the world of distributed denial-of-service (DDoS) attacks, host João Tomé is joined by our DDoS expert, Omer Yoachimik.