Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JumpCloud Acquires Stack Identity, Paving the Way for Identity-First Security

JumpCloud Inc. is continuing its identity-first momentum by acquiring Stack Identity. Stack Identity is a next-generation identity security and access visibility platform. This acquisition strengthens JumpCloud's identity-first access management solution.

Cloud security research and guide roundup: DevSecOps, threat detection, and AI

In Part 1 of our cloud security research and guide roundup, we looked at our contributions to helping you manage cloud infrastructure, data, identities, and access. In Part 2, we share our research, insights, and guides from Datadog Security Labs and The Monitor that support the NSA’s cloud mitigation strategies in the following areas: We’ll also go beyond these common strategies to look at how security plays a role in working with LLMs.

The State of Azure DevOps Threat Landscape - 2024 In Review

The year 2024 is over, so it’s time to sum up what threats were the most dangerous for DevOps and PMs. Outages, degraded service performance, vulnerabilities, cyberattacks, ransomware – all of those were appearing in media headlines all year round. Thus, for the third year in a row, we’ve decided to analyze incidents related to Git hosting services, like Azure DevOps, GitHub, GitLab, and Atlassian. Our first article in a DevOps threat landscape series is dedicated to Azure DevOps.

Cloudflare meets new Global Cross-Border Privacy (CBPR) standards

Cloudflare proudly leads the way with our approach to data privacy and the protection of personal information, and we’ve been an ardent supporter of the need for the free flow of data across jurisdictional borders. So today, on Data Privacy Day (also known internationally as Data Protection Day), we’re happy to announce that we’re adding our fourth and fifth privacy validations, and this time, they are global firsts!

11:11 Systems Celebrates 2024 Cloud Computing Backup and Disaster Recovery Award

We are grateful and honored to share that 11:11 Systems has been recognized by Cloud Computing Magazine with the 2024 Cloud Computing Backup and Disaster Recovery Award for the fourth year in a row. This recognition reflects not only the innovation and reliability of our services but, more importantly, the trust and partnership we share with our customers.

Improving AWS security services with Sysdig Secure

One of the primary goals of information security is to protect data, which of course entails protecting the resources that store and provide access to that data. According to the NIST Cybersecurity Framework, organizations need to develop and implement the necessary protections to restrict or mitigate the effect of a possible cybersecurity incident. Security should be integrated right from the source of the cloud architecture design process.

Simplifying Zero Trust Security for AWS with Teleport

Speakers: Managing secure access has become a critical challenge for organizations using AWS at scale. Traditional security approaches, like passwords and virtual private networks (VPNs), are not sufficient to protect growing infrastructures while maintaining productivity. This webinar, "Simplifying Zero Trust Security for AWS with Teleport," explores how Teleport enables a modern, identity-first approach to AWS access.

Stratoshark: Extending Wireshark's legacy into the cloud

There is nothing more exciting (or nerve-wracking) than sharing something you’ve created with the world. Over 25 years ago, we started working on Wireshark. For us, it has always been more than just a piece of software — it’s how we met, how we began our careers, and how we learned to solve problems that once seemed insurmountable.