Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

Don't Choose a Cloud Storage Service Without Asking These 10 Critical Cybersecurity Questions

As the demand for cloud storage continues to rise, individuals and businesses alike are faced with the critical decision of choosing a reliable and secure cloud storage provider. While the convenience and accessibility offered by cloud storage are undeniable, it is essential to prioritize cybersecurity and data protection when entrusting sensitive information to a third-party provider.

How to secure Generative AI applications

I remember when the first iPhone was announced in 2007. This was NOT an iPhone as we think of one today. It had warts. A lot of warts. It couldn’t do MMS for example. But I remember the possibility it brought to mind. No product before had seemed like anything more than a product. The iPhone, or more the potential that the iPhone hinted at, had an actual impact on me. It changed my thinking about what could be.

Announcing Cloudflare Secrets Store

We’re excited to announce Secrets Store - Cloudflare’s new secrets management offering! A secrets store does exactly what the name implies - it stores secrets. Secrets are variables that are used by developers that contain sensitive information - information that only authorized users and systems should have access to.

Stopping API attacks with Salt Security and AWS WAF

Every company’s APIs are unique and so are its security gaps. Bad actors will poke and prod to learn your APIs and find mistakes in business logic they can exploit. Catching these attacks requires context and deep behavioral analysis over time. With its recent AWS WAF Ready designation, Salt Security makes it easier and faster for businesses to protect the APIs running in their AWS environments. Salt provides the visibility, intelligence, and context over time to identify and block attacks using tools you already rely on such as Amazon API Gateway, AWS WAF, and other inline enforcement points.

Protecting Azure Active Directory with Rubrik Security Cloud

I’d position the following scenario to you as hypothetical but the reality of it is we have all been there at one time or another. Either as the result of a rogue script, a complete accident, or even malicious behavior, many are familiar with that sinking feeling when you noticed certain Azure Active Directory (Azure AD) objects have been deleted. Whether it be Users, Groups, Enterprise Apps, or Application Registrations, businesses rely on these Azure AD objects.

Securing DNS: How to protect your business against security and performance pitfalls

This whitepaper discusses the many challenges that DNS providers and users face including massive cyber attacks as well as performance and reliability issues, and how Cloudflare can help resolve these challenges, ensuring business continuity.

Cloudflare Equips Organisations with the Zero Trust Security They Need to Safely Use Generative AI

Now companies can give their teams the productivity and innovation of emerging generative AI - while reducing risk with built-in security and governance controls over the flow of data.