Backups have always been our strength. BDRSuite and BDRCloud earned their reputation for cost-effective, reliable protection. But today, the stakes are higher. Ransomware, compliance demands, and costly downtime have redefined what backup must deliver. It’s no longer enough to just have copies of data — those copies must be untouchable, tamper-proof, and instantly recoverable when it matters most.
For most CTOs, the real compliance problem is not passing audits. It is how compliance pushes releases to a halt and drains DevOps velocity. Code ships daily, deployments span clouds, and CI/CD moves fast. Quarterly or annual checks simply do not keep up, and that gap creates audit fatigue and surprise findings. Continuous compliance reframes this by integrating controls into the delivery process.
APIs have quietly become the new first point of failure. They run the workflows your customers see, as well as the ones they never do. Every transaction, every authentication, every AI-driven feature is stitched together through APIs. That same interconnection has made them one of the most consistently underprotected parts of modern infrastructure. The numbers show the shift.
Managed identities offer a paradigm shift from "what fo you have"to "who you are" authentication, providing automated, short-lived credentials that eliminate credential sprawl across multicloud environments.
We’re excited to share new updates and enhancements for August, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.
Security professionals everywhere face a paradox: while more data provides the visibility needed to catch threats, it also makes it harder for humans to process it all and find what's important. When there’s a sudden spike in suspicious traffic, every second counts. But for many security teams — especially lean ones — it’s hard to quickly figure out what’s going on. Finding a root cause means diving into dashboards, filtering logs, and cross-referencing threat feeds.
Organizations face continuous threats from phishing, business email compromise (BEC), and other advanced email attacks. Attackers adapt their tactics daily, forcing defenders to move just as quickly to keep inboxes safe. Cloudflare’s visibility across a large portion of the Internet gives us an unparalleled view of malicious campaigns. We process billions of email threat signals every day, feeding them into multiple AI and machine learning models.
*Catch Lookout's On-Demand Session from Black Hat 2025!* Your digital identity is the crown jewel, and adversaries are bypassing traditional network and EDR defenses by weaponizing the human element. The modern kill chain has evolved, exploiting our most ubiquitous and often least-secured endpoints: mobile devices. This isn't theoretical; it's the operational reality for sophisticated threat actors.