Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Best Practices for Securing Generative AI with SASE

As Generative AI revolutionizes businesses everywhere, security and IT leaders find themselves in a tough spot. Executives are mandating speedy adoption of Generative AI tools to drive efficiency and stay abreast of competitors. Meanwhile, IT and Security teams must rapidly develop an AI Security Strategy, even before the organization really understands exactly how it plans to adopt and deploy Generative AI.

Securing the AI Revolution: Introducing Cloudflare MCP Server Portals

Large Language Models (LLMs) are rapidly evolving from impressive information retrieval tools into active, intelligent agents. The key to unlocking this transformation is the Model Context Protocol (MCP), an open-source standard that allows LLMs to securely connect to and interact with any application — from Slack to Canva, to your own internal databases. This is a massive leap forward.

Automating MITRE ATT&CK Analysis with Torq Socrates

MITRE ATT&CK has become the de facto SOC framework for classifying adversary behavior — and for good reason. It gives SOC teams a common language to describe threats, uncover gaps, and fine-tune detection logic. But let’s be honest: mapping real-world activity to ATT&CK tactics and techniques is still a time-consuming grind.

ASPM Explained: The New Standard for Enterprise-Grade App Protection

Application Security Posture Management (ASPM) is a unified intelligence layer that transforms scattered security data into actionable business insights. Why should you care about this new security approach when you already have a working structure in place? To understand this, let’s first look at the security approach that enterprises usually follow and why it is dated.

Clickjacking: What it means for 1Password users

This blog details how 1Password has addressed clickjacking in the latest version of our browser extension (version 8.11.7). We have no indication that this class of vulnerability directly puts 1Password’s systems at risk. Clickjacking is a technique where a malicious or compromised webpage visually disguises or overlays elements of a page or browser extension, like the autofill menu, so that a user unintentionally clicks on them.

Investigating the Oyster Backdoor Campaign and its Targeting of IT Professionals

BlueVoyant investigated the latest Oyster malware attacks, delivered in a widespread campaign targeting IT professionals by impersonating legitimate IT tools. The campaign was originally discovered by outside researchers, but when BlueVoyant’s SOC observed suspicious behavior in a client environment within the healthcare sector, the team, including the Threat Fusion Cell (TFC), decided to delve deeper.

DNS Tunneling: The Blind Spot in Your Network Security Strategy

The Domain Name System (DNS) is a critical component of internet infrastructure, responsible for translating human-readable domain names into IP addresses. However, the ubiquitous nature and often-overlooked security aspects of DNS make it a prime target for malicious actors. This blog post investigates the tools used for data exfiltration over DNS, the techniques involved, and the countermeasures to mitigate these threats.

The Role of Staffing Services in Engineering Success

Every company knows the difficulty of finding the right talent. In engineering, the challenge is even greater. Technical projects demand professionals with not only strong credentials but also specialized expertise that fits a specific industry. For businesses trying to complete projects on time and within budget, the ability to connect with the right people makes all the difference. This is where tailored staffing services come in.