Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Azure Functions Integration: Secure Your Serverless APIs with Astra

Azure Functions provide a scalable and event-driven way to build serverless APIs, but securing them requires continuous monitoring and threat detection. By integrating Astra’s API Security Platform with Azure Functions, you can proactively identify vulnerabilities, monitor API traffic, and protect your serverless applications from real-world attacks.

NGINX Integration: Protect Your API Gateway with Astra

NGINX is a widely used API gateway that efficiently manages API requests, but securing API traffic requires continuous monitoring. By integrating Astra’s API Security Platform with NGINX, you can enhance security by analyzing API requests in real time and detecting vulnerabilities before they are exploited.

Cloud Security in 2025 What CISOs Need to Prepare For with João Pedro Gonçalves and Michael Tremante

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by João Pedro Gonçalves, CISO and Managing Director at EQT Group, and Michael Tremante, Senior Director of Product at Cloudflare. Together, they explore critical security trends for 2025, from AI-powered threats to regulatory changes to practical strategies for balancing protection with usability. What You’ll Learn.

One of the biggest cybersecurity myths out there?

One of the biggest cybersecurity myths out there? VPNs equal complete privacy. Here's what you need to know: A VPN hides your IP address, but it doesn't make you anonymous. Your VPN provider still has your data and logs and can hand them over if requested. Websites still track you through cookies, fingerprints, and browser activity. On the latest episode of The Connectivity Cloud Podcast, João Pedro Gonçalves and Michael Tremante break down why VPNs aren't the silver bullet they're marketed to be.

Cloudflare Bot Management Demo

Cloudflare applies a layered detection approach to Bot Management with several detection engines that cumulatively impact the bot score. Bot scores can be used in WAF rules to create granular security policies. This demo highlights how Cloudflare can help with several use cases including web scraping, account takeover, and AI bot protection. Additionally, Cloudflare's AI Assistant, Cloudy, is used to review additional bot analytics and create a WAF rule based on bot score and additional criteria.

This Month in Datadog: Reference Tables is generally available, Attacker Clustering, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service | Datadog.