Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Essential Cloud Native Security Tutorial

The cloud gives you agility, speed, and flexibility – but it also opens new doors for attackers. For DevOps teams, every line of code, every container, and every deployment pipeline is a potential entry point and missteps are easier than ever. Misconfigurations alone cause 80% of all security breaches in cloud environments, so the stakes are even higher. This poses a severe security risk with wide-ranging consequences, making it evident that cloud-native environments demand a new security mindset.

8 Privileged Access Management (PAM) Best Practices for Cloud Infrastructure

Even the simplest mistakes can leave your data wide open to cyber threats. If the worst happens and there’s an attack, cybercriminals gain free-for-all access to your cloud resources. They tamper with your data, disrupt workflows, and steal sensitive information, meaning the need for Privileged Access Management (PAM) best practices are more indispensable than ever for any robust cloud security strategy.

Perimeter Security vs Cyber Resilience: CSPM vs DSPM

In this episode of Into the Breach, James Purvis is joined by Noam Perel to explore the key differences between CSPM (Cloud Security Posture Management) and DSPM (Data Security Posture Management). They dive into how these tools address different problems, their unique approaches to security, and why organizations benefit from leveraging both. Discover how DSPM’s data-centric approach complements CSPM’s infrastructure focus, the distinct personas driving each, and how together they provide a stronger, more resilient security posture.

Falcon Cloud Security Asset Graph: Demo Drill Down

Gain the edge in the race against adversaries by leveraging unified visibility across your attack surface—from endpoint to cloud. See how Falcon Cloud Security's Asset Graph uncovers vulnerabilities, highlights misconfigurations, and automatically maps the complete attack trajectory, empowering you to respond faster and mitigate threats effectively.

2025 Internet predictions (AI included) with John Graham-Cumming

Join host João Tomé and Cloudflare's CTO John Graham-Cumming for the final episode of "This Week in Net" in 2024, broadcasting from a rainy Lisbon, Portugal. The conversation reflects on Cloudflare's achievements throughout the year, including significant developments in Workers platform, AI capabilities, and hardware innovations. The episode explores predictions for 2025, examining the intersection of AI and privacy, quantum-resistant encryption, and cybersecurity threats. John Graham-Cumming shares his perspective on how AI capabilities will become more seamlessly integrated into daily life.

Unify Security Posture and Protection for Faster Cloud Detection and Response

Adversaries are taking aim at cloud environments, as evidenced by the 75% increase in cloud intrusions in 2023. Organizations are under growing pressure to ensure they have measures in place to effectively detect, investigate and respond to cloud-focused attacks. Cloud detection and response (CDR) is uniquely challenging for SOC teams due to their limited visibility into the cloud control plane, resource configurations and application deployments.

What Is Cloud Penetration Testing and Why Do You Need It?

Chances are, your business is already operating in the cloud. The rewards of moving into the cloud are undeniable - organizations can build and launch new services and add computing capacity more easily than on premises in a more cost-effective manner. The cloud is indispensable for growing at the speed of the market.

A Last-Mile Solution for AWS Customers and part of the AWS EDP

Managed Connectivity and network services combine to offer a complete solution by seamlessly integrating direct access to AWS with network capabilities. This managed overlay solution combined with a robust network underlay ensures a secure and scalable infrastructure tailored to meet the unique demands of customers.

Grinch Bots strike again: defending your holidays from cyber threats

Back in 2021, we covered the antics of Grinch Bots and how the combination of proposed regulation and technology could prevent these malicious programs from stealing holiday cheer. Fast-forward to 2024 — the Stop Grinch Bots Act of 2021 has not passed, and bots are more active and powerful than ever, leaving businesses to fend off increasingly sophisticated attacks on their own.