Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Advanced Certificate Manager: Essential TLS Control for Regulated Industries

Get full, granular TLS control with Cloudflare Advanced Certificate Manager (ACM). While every Cloudflare account includes free basic TLS, complex and highly-regulated businesses, like technology, financial services, or healthcare, need more granular control, and ACM eliminates the manual overhead of managing certificates. Key Features Include: Helpful Links & Resources.

Agentic Context Security Platform Protecto is Now Available on Google Cloud Marketplace

Enterprise Agentic AI adoption faces a critical barrier: sensitive data exposure. AI agents perform tasks only as well as the context provided to them. However, context is precisely where enterprise data enters the workflow, introducing significant risk. Organizations need to deploy AI applications while maintaining strict data security, regulatory compliance, and privacy. This challenge stalls production deployments across enterprises, especially in healthcare and financial services.

BlueVoyant TPRM Is Now Available on Google Cloud Marketplace

We're excited to announce that BlueVoyant's Third-Party Risk Management (TPRM) solution is now available on Google Cloud Marketplace. This milestone makes it easier than ever for organizations to purchase, deploy, and start managing supply chain cyber risk while getting more value from their existing Google Cloud Platform (GCP) investment.

When the Data Center Closes: A Complete Cloud Migration Story

Staying healthy sounds easy, but it’s often a daunting and complex process. It involves balancing diet, exercise, sleep, and routine doctor visits, among other things. For many, this lifelong commitment can cause fear, worry, and anxiety. Similarly, migrating a production environment to the cloud is a complex process. When a data center closure is on the horizon, the pressure mounts quickly.

AWS GuardDuty Modules Explained: Features, Coverage, and How Customers Benefit with Coralogix

As organizations continue to scale their AWS environments, security teams face increasing challenges in detecting cloud-native threats such as compromised credentials, misused APIs, container breaches, and malicious workload behavior. Traditional perimeter-based controls and legacy endpoint tools are often insufficient in dynamic, cloud-first architectures. AWS GuardDuty provides native,intelligent threat detection for AWS environments.

AI Workload Security on AWS: Evaluating Native Tools vs Third-Party Solutions

Your Bedrock agent running on EKS receives a prompt through your RAG pipeline. CloudTrail logs it as a normal bedrock:InvokeModel event—status 200, authorized IAM role, expected endpoint. But inside the container, the agent’s response triggers a tool call that spawns curl to an external IP, exfiltrating the context window. GuardDuty doesn’t flag it because the connection routes through a permitted VPC endpoint. You open your AWS console and see a healthy API call.

Is Icedrive Safe to Store Your Personal Files?

If you’re tired of big tech cloud companies profiting from your data, fortunately, you have a variety of options available to make the switch from Google Drive, OneDrive, iCloud, and others. From cloud companies like Internxt, which was founded as a secure and private alternative to Google Drive, to Icedrive, a cloud storage company from the UK, you may be considering which option is best for you. But, is Icedrive safe?

Standing up for the open Internet: why we appealed Italy's "Piracy Shield" fine

At Cloudflare, our mission is to help build a better Internet. Usually, that means rolling out new services to our millions of users or defending the web against the world’s largest cyber attacks. But sometimes, building a better Internet requires us to stand up against laws or regulations that threaten its fundamental architecture.