Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud Trends : How They're Reshaping Cybersecurity

Cloud adoption is accelerating, but with it comes new security challenges. In this video, we discuss: The rise of multi-cloud and hybrid cloud strategies. Key security concerns like visibility gaps and the shared responsibility model. How to stay secure while trusting—and verifying—your cloud provider. Takeaways: Understand cloud trends, security risks, and your role in protecting your workloads.

Protect Your Data within your Generative AI workflow with Protegrity on AWS Bedrock

Collaboratively authored by Anthony Cammarano, Mario Vargas, Muneeb Hasan, Alexandre Charlet, Andre Castro, Vic Levy, Ken Darker and Iwona Rajca Generative AI (GenAI) applications are revolutionizing how businesses interact with data, primarily through Retrieval-Augmented Generation (RAG) pipelines, combining language models with vast enterprise knowledge bases. These pipelines allow organizations to query extensive internal datasets in real time.

The Role of Cloud Communication in Streamlining Operations

As businesses increasingly embrace digital transformation, communication remains the backbone of seamless operations. Traditional systems are no longer sufficient to meet the demands of modern businesses that require efficiency, flexibility, and scalability. Cloud communication has emerged as a powerful solution, transforming how teams collaborate, manage workflows, and ensure smooth operations. With its ability to centralize communication tools and streamline processes, cloud-based solutions are revolutionizing business efficiency.

Riscosity and Microsoft Azure: A Powerful Partnership for Data Security

This collaboration is a significant step forward in making robust data security accessible to all organizations. By leveraging the Azure Marketplace, we're empowering Azure customers to easily discover, deploy, and integrate Riscosity into their existing infrastructure. This seamless integration allows for a streamlined experience and faster time to value.

What's the Difference Between DSPM, CSPM, and CIEM?

DSPM, CSPM, and CIEM are more than just a mouthful of acronyms. They are some of today’s most sophisticated tools for managing data security in the cloud. While they are all distinct entities and go about protecting data in different ways, the fact that they all seem to do very much the same thing can lead to a lot of confusion. This, in turn, can sell each of these unique solutions short – after all, they were all created in response to a specific problem.

The Evolution of Cyber Attacks: Lessons for Staying Safe in 2025

The pace at which cyberattacks are evolving has accelerated in recent years, driven by technological advances, particularly artificial intelligence (AI) and machine learning. The sophistication of cybercriminals' tactics has reached unprecedented levels, posing new challenges for traditional cybersecurity defenses. In this article, we will explore the key developments in cyber threats, identify emerging risks, and offer practical lessons on how businesses and individuals can stay safe in 2025.

Cloudflare Radar's 2024 Internet Year in Review

Explore the worldwide trends that shaped the Internet with Cloudflare Radar’s 2024 Internet Year in Review. Join Host João Tomé and Cloudflare Head of Data Insights, David Belson as they look at Internet trends and patterns across 2024. We also discuss Robotcop and how content creators can prevent bots and crawlers from scraping their sites using a button in the AI Audit section of the Cloudflare dashboard.

The Critical Role of Cloud Security Architecture in Building Resilience

As cloud computing technologies are quickly have become mainstream due to the multitude of benefits that have transformed how we store, manage, and access data, the enterprise landscape is rapidly changing how they interact with data and applications. However, one of the overlooked and most misunderstood activities that must be performed to successfully leverage cloud computing technologies is the creation of a cloud computing security architecture.