Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Announcing General Availability for the Magic WAN Connector: the easiest way to jumpstart SASE transformation for your network

Today, we’re announcing the general availability of the Magic WAN Connector, a key component of our SASE platform, Cloudflare One. Magic WAN Connector is the glue between your existing network hardware and Cloudflare’s network — it provides a super simplified software solution that comes pre-installed on Cloudflare-certified hardware, and is entirely managed from the Cloudflare One dashboard.

Using Corelight to Identify Ransomware Blast Radius

Over the past few months, ransomware targeting healthcare organizations has been on the rise. While ransomware is nothing new, targeting healthcare organizations, at the extreme, can impact an organization’s ability to engage in anything from routine office visits to life-or-death diagnoses, treatments, and patient care.

Cloudflare vs. Azure WAF

Cloudflare WAF protects against web-based attacks and malicious traffic using customizable rule sets. Cloudflare’s network extends across numerous data centers worldwide, ensuring efficient content delivery and robust DDoS protection. Moreover, Cloudflare provides supplementary functionalities such as CDN caching, SSL/TLS encryption, and DNS management to enhance overall web performance and security.

Why EDR and NDR Tools Are Not Zero Trust Security Solutions & What to Use Instead

Lock the doors inside your home, hand out keys sparingly, then turn on an alarm in every room. Your house will get a lot more secure. However, it will also become unlivable. Tight security policies, access conditions, and subnetting configurations can take away risk but even mature Zero Trust Architecture (ZTA) environments must balance cybersecurity with usability.

Coffee Talk with SURGe: The Interview Series featuring Sherrod DeGrippo

Join Ryan Kovar and special guest Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft, for a discussion about crimeware, threat actor naming conventions, and Sherrod's essay in a new book by SURGe titled, "Bluenomicon: The Network Defender's Compendium.".

Evaluating container firewalls for Kubernetes network security

Firewall technology for network security has undergone considerable advancement with the introduction of cloud computing and the vanishing network perimeter with hybrid and multi-cloud environments. All along this transformation one thing that did not change is the way endpoints are identified – through the TCP/IP stack, specifically the IP address. This design principle needed a change for container-based applications. How did the NGFWs fare?

3 Types of Security Scans Every Organization Should Be Using

According to IBM’s 2023 Cost of a Data Breach Report, it takes the average organization 277 days to detect and contain a breach. However, organizations with a robust risk management program can drastically reduce these numbers through proactive identification and remediation of vulnerabilities.

Fortifying your wireless network: A comprehensive guide to defend against wireless attacks

In our increasingly interconnected world, wireless networks have become the lifeblood of modern communication and productivity. However, this convenience comes with a price – the heightened risk of wireless attacks. In this in-depth blog, we will delve into the technical intricacies of safeguarding your network against wireless threats. Armed with this knowledge, you can confidently defend your wireless infrastructure against potential attackers.