Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

Looking Back: What We Learned in 2024

Looking back on 2024 to start the new year, we had the great opportunity to host and be part of several conversations and demonstrations that we hope were valuable learning opportunities for everyone who joined us. Let’s take a moment to review some of the highlights from those 2024 events before we leap into 2025.

API Security: Beyond the Edge

In today’s interconnected world, organizations often rely on traditional perimeter defenses like Web Application Firewalls (WAFs), API gateways, and Content Delivery Networks (CDNs) to secure their applications. These edge solutions act as gatekeepers, controlling access at the perimeter, but they are increasingly marketed as comprehensive API security measures.

An organization is Only as Secure as Its Weakest Link: Why API Security Shouldn't Be Overlooked

In the modern digital age, cybersecurity has never been more crucial — or more challenging. As organizations become more connected and reliant on technology, their attack surfaces expand. The classic adage, “An organization is only as secure as its weakest link,” has never been more relevant. APIs are the backbone of digital age – connecting everything – customers/vendors/partners and power most of the technology today including GenAI.

HHS Proposes Critical HIPAA Security Rule Updates to Combat Rising Cybersecurity Threats in Healthcare

The Health and Human Services Office of Civil Rights (OCR) has launched an effort to improve cybersecurity measures for a wide variety of healthcare organizations. The aim is to counter the significant increase in the number of breaches and cyberattacks impacting healthcare along with the common deficiencies OCR has observed in its investigations into Security Rule compliance, cybersecurity guidelines, best practices, methodologies, procedures, and processes.

2025 Internet predictions (AI included) with John Graham-Cumming

Join host João Tomé and Cloudflare's CTO John Graham-Cumming for the final episode of "This Week in Net" in 2024, broadcasting from a rainy Lisbon, Portugal. The conversation reflects on Cloudflare's achievements throughout the year, including significant developments in Workers platform, AI capabilities, and hardware innovations. The episode explores predictions for 2025, examining the intersection of AI and privacy, quantum-resistant encryption, and cybersecurity threats. John Graham-Cumming shares his perspective on how AI capabilities will become more seamlessly integrated into daily life.

Falcon Cloud Security Asset Graph: Demo Drill Down

Gain the edge in the race against adversaries by leveraging unified visibility across your attack surface—from endpoint to cloud. See how Falcon Cloud Security's Asset Graph uncovers vulnerabilities, highlights misconfigurations, and automatically maps the complete attack trajectory, empowering you to respond faster and mitigate threats effectively.

Perimeter Security vs Cyber Resilience: CSPM vs DSPM

In this episode of Into the Breach, James Purvis is joined by Noam Perel to explore the key differences between CSPM (Cloud Security Posture Management) and DSPM (Data Security Posture Management). They dive into how these tools address different problems, their unique approaches to security, and why organizations benefit from leveraging both. Discover how DSPM’s data-centric approach complements CSPM’s infrastructure focus, the distinct personas driving each, and how together they provide a stronger, more resilient security posture.

Why Patching Isn't the Ultimate Goal in Cybersecurity

A recent analysis by JPMorganChase criticized the CVSS scoring process, finding missing context leads to misleading prioritization. When it comes to cybersecurity, patching vulnerabilities often feels like the Holy Grail. Get those CVEs patched, and you’re safe, right? Well, not exactly. As we know, patching isn’t as straightforward—or as effective—as we’d like to believe.

5 trust trends shaping security strategies in 2025

Trust is critical to the success of every business. And in 2024, we saw that building, scaling, and demonstrating trust is getting more difficult for organizations. ‍ Vanta’s second annual State of Trust Report uncovered key trends across security, compliance, and the future of trust. Based on a survey of 2,500 IT and business leaders in the U.S., UK, and Australia, our research found that more than half (55%) of organizations say that security risks for their business have never been higher.

Sysdig is recognized as a Customers' Choice in Gartner Voice of the Customer for Cloud-Native Application Protection Platforms

As the adoption of cloud-native technologies like containers, Kubernetes, and microservices have evolved, traditional security solutions have struggled to keep up. According to the Sysdig Threat Research Team (TRT), the average time it takes an attacker to perform reconnaissance and complete an attack is just 10 minutes. To help teams outpace attackers, cloud-native application protection platforms have emerged.