Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Crafting a Robust Cloud Security Strategy in 2024

As cloud computing has evolved, we’ve entrusted more and more of our data to it. Our everyday correspondence is in the cloud; our favorite applications are in the cloud; and, more and more, our most sensitive data is in the cloud. To protect the integrity of your organization’s assets, you’ll need a comprehensive cloud security strategy. However, the cloud isn’t a single piece of hardware or software.

The IT Hour | Roadmap Webinar Recap 06.14.24

Chase Doelling, Principal Strategist will join us with all the latest from the most recent Roadmap Webinar. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.

The Future of Endpoint Protection: AI and Predictive Security

Traditional security measures, while essential, are often reactive, scrambling to respond to attacks after they've occurred. Endpoint protection stands as a critical line of defense against an increasingly sophisticated array of cyber threats. Its future lies in proactive, intelligent solutions that leverage the power of AI and predictive security to anticipate and prevent threats before they can cause harm.

Commands | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover how to add configure and run commands on your JumpCloud managed devices. JumpCloud commands allow admins to run custom commands via bash and PowerShell. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Revolutionizing Security: AI at the Heart of Modern Protection

Dive into the future of security with us at Brivo as we explore how AI-Centric Security is transforming the way we protect spaces in real-time. Join Neerja Bajaj in uncovering the power of artificial intelligence in analyzing security data, identifying threats, and responding with unmatched efficiency. From commercial real estate to multifamily residential areas, discover how Brivo leverages cutting-edge AI to ensure your safety and peace of mind.

Celebrating 10 years of Project Galileo (with Alissa Starzak)

Alissa Starzak, Global Head of Policy at Cloudflare, about our Project Galileo that is celebrating 10 years. In June 2014, Cloudflare launched Project Galileo, a program which today provides security services, at no cost, to more than 2,600 independent journalists and nonprofit organizations around the world supporting human rights, democracy, and local communities.

What is Cloudforce One. How we thwarted FlyingYeti's campaign targeting Ukraine

In this week’s episode, we have a segment about how we thwarted a threat campaign targeting Ukraine and explain what our team, Cloudforce One, does. Host João Tomé is joined by Blake Darché, Head of Cloudforce One. First, we discuss how Cloudforce One employed proactive defense measures to successfully prevent Russia-aligned threat actor FlyingYeti from launching their latest phishing campaign targeting Ukraine.

Amazon S3 Data Protection: The Myths and the Facts

So, you’re all set up with Amazon Simple Storage Service (Amazon S3), because you’re looking for best-in-class solutions for your company’s structured and unstructured data. Smart. But there’s more to do. Here are some myths about your Amazon S3 data, the real story behind them. Phew! We’re glad you agree that your Amazon S3 data needs strong protection. Wise decision. Here’s where we can help with a faster, cheaper, better solution.

How to Migrate CentOS 7 to AlmaLinux

Jump to Tutorial As of June 30, 2024, CentOS 7 will reach its end of life (EOL). That means it will no longer receive updates, bug fixes, critical security patches, or any new features. It is very important to migrate to a supported operating system to maintain the functionality and security of your systems. AlmaLinux is a reliable alternative to CentoOS. It’s a community-driven enterprise distribution that is binary compatible with Red Hat Enterprise Linux (RHEL).

OWASP API Top 10 Explained with Real-World Examples

It’s an API talking to the API world we’re living in. As per Postman, 500 million new APIs are expected to be created by 2025. APIs are a lifesaver when it comes to automation or integration. But when it comes to the security of these APIs, things can get a little tricky. OWASP API Top 10 gives insights on top vulnerabilities exploited in APIs.