Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI-Driven Cloud Detection Engineering: Turning Security Telemetry Into Action

Amal Mammadov is a cloud security practitioner and detection engineering specialist whose work sits at the intersection of threat intelligence, cloud-native architecture, and security operations. In this interview, he outlines why most organisations are losing ground despite heavy security investments and what it actually takes to build detection programmes that produce outcomes.

Six Ways To Spot Amazon Scam Emails

You can spot Amazon scam emails if you realize the sender’s email address is not from the official Amazon domain, the message contains a generic greeting and your email service provider warns you that the message may be dangerous. According to data collected by the Federal Trade Commission (FTC), 34,000 reports were made in 2023 about scammers impersonating Amazon, resulting in approximately $19 million in losses.

How building Cloudflare with Cloudflare helps developers (with Celso Martinho)

Celso Martinho is a Senior Director of Engineering at Cloudflare. He works across multiple teams from Radar to Workers AI in our new Cloudflare Lisbon offices. In this conversation, host João Tomé and Celso discuss the rapid growth of Cloudflare Workers, simplifying life for developers, and the importance of observability in AI. Celso also dives into how the challenges for developers have changed since the 1990s tech era and why he believes the Internet is still in its infancy.

Runtime security in multi-cloud environments: best practices and importance

Runtime security in multi-cloud environments encompasses the continuous monitoring and protection of cloud-based resources during their active operation. Unlike traditional security approaches that focus on static configurations or pre-deployment checks, runtime security emphasizes: This approach ensures that potential risks are identified and mitigated in real-time, providing an additional layer of protection against both known and emerging threats in complex multi-cloud setups.

The Role of Cloud Computing in Enhancing Cybersecurity

Cloud computing revolutionizes how organizations approach data security and threat prevention. The transformation of traditional security measures into cloud-based solutions marks a significant shift in protecting sensitive information and maintaining business continuity.

Adding runtime threat detection to Google Kubernetes Engine with Falco

One of the big advantages of running your workloads on a managed Kubernetes service like Google Kubernetes Engine (GKE) is that Google ensures your clusters are being deployed and managed following industry best practices. While GKE clusters are incredibly secure and reliable, there is always room for improvement. In this blog, we’re going to describe how you can enhance GKE’s already great security by adding runtime threat detection with Falco.

Unveiling the Cloud's Hidden Risks: How to Gain Control of Your Cloud Environment

In today's rapidly evolving digital landscape, the cloud has become an indispensable tool for businesses seeking agility and scalability. However, this migration also brings a new set of challenges, particularly when it comes to security. The increasing complexity and sophistication of cyber threats demand a proactive and comprehensive approach to safeguarding your cloud environments.