Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing The Future: Cloudflare's Implementation of Post-Quantum Cryptography - Michiel Appelman

Explore how Cloudflare’s Post-Quantum Cryptography (PQC) capabilities are future-proofing enterprise security. Learn how we’re integrating PQC across our network to safeguard data against quantum threats, ensuring businesses stay protected in an evolving cryptographic landscape—without compromising performance or scalability.

Vanta signs a strategic collaboration agreement with AWS to deepen integration

We’re thrilled to announce that Vanta has signed a strategic collaboration agreement (SCA) with Amazon Web Services (AWS) to make it even easier for businesses to scale securely in the cloud. We’re expanding the reach of our compliance automation and trust management platform, enabling organizations to build stronger security programs, accelerate audit readiness, and demonstrate compliance more efficiently—all while scaling on AWS. ‍

AI security posture management (AI-SPM): All information in one place

As AI adoption grows, so do the related risks. Organizations are actively looking for strategies to secure their AI systems. According to Vanta’s State of Trust Report, 62% of organizations plan to boost investments in AI security in the next 12 months. ‍ However, another recent survey on AI governance reveals that more than half of organizations find it challenging to keep up with AI security developments.

Elastic Security Explained: Transparency, AI, and the Future of Threat Hunting

Elastic’s James Spiteri joins John Hammond to dive deep into the evolution of Elastic Security, from the ELK stack’s early days to today’s full-fledged, unified SIEM, XDR, and cloud security solution powered by agentic AI and automation. They discuss free tools, open detections, and how Elastic is making cybersecurity more accessible and collaborative for everyone.

SpiderLabs Ransomware Tracker Update September 2025: Qilin, Akira Top Ransomware Attackers

The threat groups Qilin and Akira together conducted about one-quarter of the 402 ransomware attacks tracked by Trustwave SpiderLabs in September, with the manufacturing and technology sectors receiving the brunt of these efforts. This information was derived from a new SpiderLabs ransomware tracking tool that gathers information from a variety of open intelligence sources and our own proprietary research.

GigaOm Names Torq Leader in SecOps Automation

The 2025 GigaOm Radar Report for SecOps Automation has named Torq a Leader and Fast Mover. The category’s shift this year away from SOAR to SecOps Automation confirms what SOC leaders already know, and Torq has been saying for years: Legacy SOAR is done. Too rigid, too slow, and too fragile, SOAR can’t keep up with today’s adversaries.

LevelBlue Managed WAAP Enables Organizations to Solve Day 1 WAAP Implementation Challenges

Deploying Web Application and API Protection (WAAP) systems is crucial for bolstering cybersecurity defenses. Akamai reported 108 billion API attacks over an 18-month period, underscoring the value of APIs to cybercriminals. Like any new security measure, the initial deployment brings various challenges during the "Day One" process. These Day One challenges should not compromise security effectiveness or disrupt business operations.

Ten modern SIEM use cases at cloud scale

The role of SIEM has never gone away. From the beginning, it’s been the backbone of security operations: the system where logs converge, alerts are analyzed, and incidents are investigated. What’s changed is our ability to use it correctly. Legacy, traditional SIEM tools forced trade-offs. Teams filtered data at ingest, dropped logs to control costs, or siloed analytics into disconnected point tools. The result was a SIEM that felt heavy, reactive, and underwhelming.

CTEM Solutions Explained How to Build a Stack

Vulnerability numbers are spiraling. Compliance checklists and point scans cannot keep pace. Continuous Threat Exposure Management (CTEM) provides security leaders with a practical approach to identify and mitigate real attack paths in real-time. This article explains what CTEM is, the solutions that enable it, and how to build a stack that actually shrinks exposure instead of counting it. CTEM solves the eternal problem of vulnerability management (too many vulnerabilities to ever fix) with a continuous program to find, validate, and reduce exposures before adversaries can use them.