Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Managing the non-human identity lifecycle in modern environments

Non-human identities (NHIs) such as service accounts, API keys, tokens, and workload identities now outnumber human users by 10x or more in most organizations. Unlike human identities that follow HR-driven lifecycles, NHIs are often created ad hoc, granted excessive permissions, and rarely decommissioned. Effective NHI lifecycle management spans five stages: discovery and inventory, secure provisioning, ongoing monitoring, credential risk management (including rotation), and decommissioning.

Cyber Essentials v3.3: How MSPs can address their biggest concerns

While it is not technically required, the Cyber Essentials 3.3 set of standards is quickly becoming a necessity for organizations that need to ensure public sector contract, insurance and supplier assurance in the U.K. That’s good news for managed service providers (MSPs), who now have an opportunity to build both trust and revenue by guiding clients toward Cyber Essentials certification. Acronis recently surveyed U.K. partners about Cyber Essentials.

Agent-First Observability: Dynamic Data, High Cardinality, and the Business Impact

We want to transform how companies make decisions. That is not what you expect to hear from an observability company. Observability tools are supposed to help you monitor systems, debug incidents, and maybe reduce downtime. Useful, but not exactly the foundation for business decision making. So what does observability have to do with revenue, churn, or customer experience? More than you think, because observability already sits on top of the most important data in your business.

Reverse Proxy: How It Works & Example Architecture

Accessing modern infrastructure requires more than a network-level foothold. As services spread across clouds, clusters, and regions, the question of who can reach what stops being a network question and becomes an identity question. Reverse proxies are the component that answers it. A reverse proxy sits between clients and backend services, validating identity and enforcing authorization on every inbound request before any application is touched.

How to Detect & Prevent Remote Code Execution (RCE)

Remote Code Execution (RCE) is one of the dangerous vulnerabilities when it comes to cyberattacks and safeguarding against them is critical. In real-world environments, attackers keep looking for unpatched software and misconfigurations to gain an opportunity for remote code execution. Once code execution is achieved, a simple technical glitch becomes an active intrusion. Proactive detection is a crucial part of any RCE defense strategy.

VibeScamming: Why AI-built scams are changing phishing risk

VibeScamming refers to AI-assisted phishing operations where attackers use natural-language tools to rapidly generate and modify phishing content and web pages, lowering (but not eliminating) the technical skill required. One of the primary enterprise impacts is faster phishing iteration and reconstitution after blocks or takedowns, with identity compromise remaining a major risk alongside malware and other payload-based attacks.

Cloudflare Just Shipped 20+ Features for AI Agents in One Week

The conversation explores why the Internet and the cloud were not designed for an AI-agent world, and what infrastructure needs to change as software agents begin generating code, running workflows, and interacting directly with online services. Ming and Anni walk through several announcements from Cloudflare’s Agents Week, including new tools for agent infrastructure, memory, developer workflows, AI Gateway, email, artifacts, browser automation, security, and agent-ready websites.