Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Searching Certificate Transparency Logs (Part 1)

Every TLS certificate issued by a root Certificate Authority (CA) ends up in one more more publicly accessible logs. These logs, collectively, make up the Certificate Transparency (CT) ecosystem. Unfortunately the logs are not very searchable. You can’t easily type in a domain and find all associated certificates. At CertKit we’re building CT monitoring capabilities to notify our customers when a new certificate is issued.

Cybersecurity vs. cyber resilience: What's the difference and which do you need?

Modern businesses run on software. That software generates data, and that data is often the most valuable part of your entire business. Businesses rightfully understand that they need to protect that data, but they don’t necessarily know what that really means. If you ask any executive whether they need to invest in cybersecurity, they’ll tell you, of course, they do.

What is Cyber Resilience? A Complete Guide for MSPs

Blocking every attack is impossible. The real question is this: how fast can your clients recover when one gets through? The reality is that cyberattacks are no longer a matter of “if” but “when.” For managed service providers (MSPs), this shift has redefined client expectations. While strong cybersecurity measures are essential, they are no longer sufficient on their own. What clients need is cyber resilience. Cyber resilience moves beyond prevention to ensure continuity.

Protecting your financial institution from cyberattack: Identity security solutions to real-world problems

Today’s financial institutions face evolving threats on a global scale. Online attackers without expertise (known as ‘script kiddies’) have had access to as-a-service malware for quite some time. AI is being weaponized for social engineering attacks at unprecedented speeds. And along with the potential of monetary rewards, today’s thefts also involve taking something that’s often even more profitable: Data.

To Stop AI-Powered Adversaries, Defenders Must Fight Fire with Fire

Anthropic's Threat Intelligence team recently uncovered and disrupted a sophisticated nation-state operation that weaponized Claude’s agentic capabilities and the Model Context Protocol (MCP) to orchestrate automated cyberattacks simultaneously against multiple targets worldwide. This AI-powered attack automated reconnaissance, vulnerability exploitation, lateral movement, and more across multiple victim environments at unprecedented scale and speed.

Cloud Migration Success Stories: 3 Real AWS Migrations

Searching for cloud migration success stories to validate your AWS journey? You’re making a smart move. Real-world examples prove what’s possible and help you avoid costly mistakes that businesses make when migrating without proper guidance. Cloud migration delivers clear competitive advantages: reduced infrastructure costs, improved scalability, enhanced security, and access to cutting-edge AWS technologies.

Art and Science: Cyber and Physical Security Convergence Deficiencies in the Louvre Heist

In eight short minutes on October 25, 2025, a group of thieves captured the world’s attention and imagination, perpetuating a daring heist in broad daylight and escaping with approximately €88 million worth of prized artwork from the planet’s most visited museum: The Louvre. Within the security community, the first successful robbery from the iconic Parisian landmark since 1998 was a bombshell story.

The Efficiency Shift: From Alerts to Incidents

In every security operation, time and clarity are the most limited resources. Analysts do not fail because they lack alerts; they fail because they are forced to connect dots that never form a complete picture. When visibility is fragmented, every alert appears urgent, and priorities become blurred. This is where the idea of endpoint security efficiency becomes transformative.

AI for India, built on trust: what the new AI governance guidelines mean for the future

India has taken a decisive step toward shaping a responsible and inclusive AI future. The Government of India’s AI Governance Guidelines (2025) mark a bold framework that balances innovation, accountability, and trust—three pillars critical for sustainable AI growth. At a time when the world is debating the risks and rewards of artificial intelligence, India’s approach stands out for its clarity and cultural grounding.

Replicate is joining Cloudflare

We have some big news to share today: Replicate, the leading platform for running AI models, is joining Cloudflare. We first started talking to Replicate because we shared a lot in common beyond just a passion for bright color palettes. Our mission for Cloudflare’s Workers developer platform has been to make building and deploying full-stack applications as easy as possible. Meanwhile, Replicate has been on a similar mission to make deploying AI models as easy as writing a single line of code.