Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Pillars of a Modern Identity Security Platform

A useful way to evaluate a modern identity security platform is to look at three core pillars: strong authentication and access controls, Privileged Access Management (PAM) that reduces standing privilege and secure credentials and secrets management with continuous visibility. In this blog, we’ll break down what those pillars mean, how they work together and how to evaluate and roll them out without creating gaps or friction as you scale automation and agent-driven workflows.

WhatsApp Is the Latest Example Of Why Every New AI Feature Outpaces Legacy DLP

Every new AI feature that ships into a platform your employees already use is a security question your stack probably can't answer yet. It sounds like hyperbole, but it's the structural reality of how AI adoption works in 2026. A recent update to WhatsApp is a useful illustration of why.

Standing up for the open Internet: why we appealed Italy's "Piracy Shield" fine

At Cloudflare, our mission is to help build a better Internet. Usually, that means rolling out new services to our millions of users or defending the web against the world’s largest cyber attacks. But sometimes, building a better Internet requires us to stand up against laws or regulations that threaten its fundamental architecture.

ACME Renewal Information (ARI) solves mass certificate revocation

In July 2024, DigiCert discovered they’d been issuing certificates with improper domain validation for five years. They gave customers 24 hours to replace 83,000 certificates. CISA issued an emergency alert. Critical infrastructure operators couldn’t meet the deadline. Some customers sued. That’s what mass revocation looks like in practice. The CA finds a compliance problem, the clock starts, and everyone scrambles. ACME Renewal Information (ARI) is the fix.

Why Evolving Cyber Threats Rely on Old Vulnerabilities

Credential abuse, exploitation of vulnerabilities, or phishing were the initial access vectors in 61% of breaches in 2025, according to Verizon’s 2025 Data Breach Investigation Report. While new threats present fresh challenges to security teams, reports like this highlight that cybercriminals still favor well-established attack methods and exploit familiar weaknesses.

Basic PowerCLI Scripting for VMware vSphere

Previously, we looked at PowerCLI – what it is, how to install it, and integrating into Windows Powershell ISE. Now, let’s take a look at basic scripting including connecting, PowerCLI commandlets, as well as looping. NAKIVO for VMware vSphere Backup Complete data protection for VMware vSphere VMs and instant recovery options. Secure backup targets onsite, offsite and in the cloud. Anti-ransomware features. DISCOVER SOLUTION.

Is Icedrive Safe to Store Your Personal Files?

If you’re tired of big tech cloud companies profiting from your data, fortunately, you have a variety of options available to make the switch from Google Drive, OneDrive, iCloud, and others. From cloud companies like Internxt, which was founded as a secure and private alternative to Google Drive, to Icedrive, a cloud storage company from the UK, you may be considering which option is best for you. But, is Icedrive safe?

Why geopolitical tensions should raise cyber awareness

When geopolitical tensions rise, cybersecurity quickly becomes part of the public conversation. Government agencies issue warnings. Security teams increase monitoring. Headlines start asking which organizations could become targets if cyber operations escalate alongside physical conflict. But geopolitical conflict does not suddenly create cyber risk. What it does increase is the likelihood that existing weaknesses will be tested and pre-existing risks could be exposed.

Building a CUI Enclave in SaaS: What CMMC Compliance Really Requires

Controlled Unclassified Information (CUI) occupies an unusual position in the data security landscape. It's sensitive enough to demand protection, yet it doesn't meet the threshold for formal classification. As more organizations migrate operations to cloud infrastructure, the challenge of protecting CUI has become a defining issue for Software as a Service providers-particularly those serving government contractors or handling defense-related data.