Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detect cross-account access risks in AWS with Datadog

Managing access across multiple AWS accounts is a popular approach to isolating workloads and data. While it provides several benefits to organizing the various operational requirements for the environment, it introduces additional complexity for managing IAM policies and workload permissions. A primary concern is assigning too many permissions to any one source, which increases the risk of an attacker moving within the environment undetected.

Jit Now Available on AWS Marketplace and has become a Validated AWS Partner

We did that in a record time of 12 days!! Yes, you read right, TWELVE DAYS! We are thrilled to announce that Jit is now officially listed on the AWS Marketplace. This marks a significant milestone in our journey, as it not only enhances our visibility but also makes it easier for potential customers to find, test, buy, and deploy Jit. Being listed on the AWS Marketplace is a testament to our commitment to providing top-notch services to our customers.

Secure remote access to your critical infrastructure

Applications, databases and their servers are running in a variety of locations. From on-premises data centers to cloud hyperscalers, making the need to secure administrative access more important than ever. In this video learn how Cloudflare's SASE platform can provide highly secure access, leveraging a modern ZTNA service to implement zero trust principles for access to your critical infrastructure.

Banish bots from your Waiting Room and improve wait times for real users

With Cloudflare Waiting Room, you can safeguard your site from traffic surges by placing visitors in a customizable, virtual queue. Previously, many site visitors waited in the queue alongside bots, only to find themselves competing for inventory once in the application. This competition is inherently unfair, as bots are much faster and more efficient than humans. As a result, humans inevitably lose out in these high-demand situations, unable to secure inventory before bots sweep it all up.

Securing Datadog's cloud infrastructure: Our playbook and methodology

At Datadog, we build and operate a complex, self-managed infrastructure that spans multiple cloud providers and serves many customers in regulated environments. We need to secure this large, distributed infrastructure while maintaining strict uptime requirements and scaling our finite people resources. In this post, I’ll detail the playbook that we use on Datadog’s Cloud Security team for securing our infrastructure, including.

Optimize Wordpress performance with Cloudflare's Automatic Platform Optimization

Does your WordPress site load too slowly? Cloudflare’s Automatic Platform Optimization (APO) plugin caches and serves your site from a global network, making site loads up to 72% faster! APO allows Cloudflare to serve your entire WordPress site on its global edge network, and would take HTML and CSS that would not typically be cached on the CDN to be done so automatically.

Federal Zero Trust Maturity: From Backburner to Afterburner

Three years ago, the Federal Zero Trust Strategy promised that the government would learn and adjust as new technologies and practices emerge. That time is now. Let’s explore key innovations that advance Zero Trust maturity when your industry partner uses a federal-first approach. Watch this video to learn more.

Deliver Secure, Performant & Resilient Digital Citizen Services

Join Government Technology and Cloudflare for a live webinar where a panel of experts will explore how public sector agencies can leverage a platform-based approach to seamlessly navigate the shift to digital services—without compromising on efficiency, security, or simplicity.

A Complete Guide to Cloud Risk Assessment

As organizations worldwide race to transform themselves digitally in a cloud-first world, many are doing so to the detriment of their businesses by failing to assess the security risks posed by their cloud applications and services. This oversight is not only a security issue but a core business risk that differentiates market leaders from those who are sure to face expensive setbacks and regulatory headaches.

Introducing Sysdig Threat Management: Combating threats in cloud security

Cloud security teams are often faced with an onslaught of noise from their detection tooling, making it nearly impossible to distinguish truly malicious threats from benign behaviors. Many threats will go uninvestigated simply because there aren’t enough analysts for the sheer amount of alerts, leaving organizations exposed to potential breaches.