Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2023

Detect unknown network threats with Calico Cloud Honeypods

Based on the well-known cybersecurity method, “honeypots”, Calico Cloud runtime security approach of Honeypods as decoy pods are designed to attract traffic to them from malicious sources and to detect suspicious activity within a Kubernetes cluster.

Cloud Security Optimization: A Process for Continuous Improvement

Cloud optimization is the process of correctly selecting and assigning the right resources to a workload or application with the ultimate goal of minimizing costs while improving performance and efficiency. These resources can range from computational power, memory, and storage to network capabilities. The cloud optimization process involves continuously monitoring, analyzing, and fine-tuning these resources to ensure optimal performance.

Shaping Tomorrow: Leading the Way in Cloud Security

Cloud computing has become a cornerstone of business operations, with cloud security at the forefront of strategic concerns. A significant focus within this domain is the protection of containerized environments, which are increasingly targeted in cloud-based breaches. Embracing CNAPP (Cloud-Native Application Protection Platform) is crucial, particularly for its role in securing these versatile yet vulnerable container environments.

4 Key Factors to Consider When Protecting Your Cloud Workloads

Today’s security practitioners face a daunting challenge: Staying ahead of sophisticated adversaries who have turned their attention to the expansive terrain of cloud environments. CrowdStrike observed a 95% year-over-year increase in cloud exploitation in 2022. This trend demands strategic reevaluation of how organizations protect their cloud environments and workloads, and emphasizes the importance of choosing the right cloud security capabilities.

Cloud Risk Management: The DevOps Guide

For DevOps software developers, navigating the cloud landscape without a clear understanding of risks is equivalent to walking into a minefield blindfolded. Cloud risk management, therefore, becomes an indispensable tool for DevOps – enabling us with the ability to identify, assess, and mitigate potential threats that could jeopardize their applications, their data, and their organization’s reputation.

The ultimate guide to cloud DLP for GenAI

How many of us use ChatGPT? And how many of us use SaaS applications as part of our daily workflows? Whether you know it or not, if you use either of these tools, your data has likely traveled beyond the boundaries of your “fort.” What do I mean by “fort,” exactly? For this guide, consider your “fort” to be somewhere where you can monitor and secure your data. When data leaks outside your “fort,” it presents a myriad of possible risks.

Have your data and hide it too: An introduction to differential privacy

Many applications rely on user data to deliver useful features. For instance, browser telemetry can identify network errors or buggy websites by collecting and aggregating data from individuals. However, browsing history can be sensitive, and sharing this information opens the door to privacy risks. Interestingly, these applications are often not interested in individual data points (e.g.

The Impact of Cloud Computing on Threat Intelligence

The advent of cloud computing has revolutionized various industries, with cybersecurity being no exception. In the realm of threat intelligence, cloud computing has emerged as a game-changing force, enhancing the way intelligence is gathered, analyzed, and applied. This post delves into the transformative impact of cloud-based solutions on threat intelligence.

Hybrid Cloud vs. Multi-Cloud: What's the Difference?

In the beginning, there was “the cloud.” The concept was a bit fuzzy around the edges (like all clouds), but compliance officers understood what the term meant. The cloud was the ability of one company to provide computing, storage, and networking capabilities to other companies via the Internet — whenever the customer needed those services, and as many services as needed. As cloud computing evolved, so did specializations.

Don't Let the Cyber Grinch Ruin your Winter Break: Project Cybersafe Schools protects small school districts in the US

As the last school bell rings before winter break, one thing school districts should keep in mind is that during the winter break, schools can become particularly vulnerable to cyberattacks as the reduced staff presence and extended downtime create an environment conducive to security lapses. Criminal actors make their move when organizations are most vulnerable: on weekends and holiday breaks.

Strengthen Your Identity Security: CyberArk's Integration with AWS

In today's digital landscape, safeguarding identities is paramount. CyberArk's integration with diverse AWS technologies fortifies your defense against identity-focused threats. This collaboration empowers organizations to bolster their Identity Security strategies, thwart attacks, and ensure seamless, secure user experiences throughout the enterprise. Discover how CyberArk and AWS combine forces to elevate your security measures and protect against evolving cyber risks. Dive into this insightful video to learn more about this powerful partnership and safeguard your digital identities effectively.

What Are the Benefits of Cloud Adoption in Insurance?

The rise of cloud computing has been one of the most transformative technologies of the past several decades. According to research firm Gartner, public cloud services spending will increase from $313 billion in 2020 to $482 billion in 2022. Further, by 2026, it will exceed 45 percent of all enterprise IT spending, up from less than 17 percent in 2021. There’s no doubt that cloud adoption will continue to increase.

How to Achieve and Maintain AWS Compliance

For many organizations, the transition to the cloud for data storage is inevitable. Whether shifting operations entirely to a cloud environment or modernizing your systems using cloud-based applications, you must choose the best cloud computing platform with the best cloud security for your compliance program.

Integrating Turnstile with the Cloudflare WAF to challenge fetch requests

Two months ago, we made Cloudflare Turnstile generally available — giving website owners everywhere an easy way to fend off bots, without ever issuing a CAPTCHA. Turnstile allows any website owner to embed a frustration-free Cloudflare challenge on their website with a simple code snippet, making it easy to help ensure that only human traffic makes it through.

Datadog on AWS Identity Management

For many engineers, Identity Management can elicit a broad range of emotions—from confusion during setup and configuration, to complete disinterest as it disappears into the background during day-to-day work, to frustration they encounter erroneously blocked access, and sometimes to terror when misconfigurations lead to a breach.

Australia's cybersecurity strategy is here and Cloudflare is all in

We are thrilled about Australia’s strategic direction to build a world-leading cyber nation by 2030. As a world-leading cybersecurity company whose mission is to help build a better Internet, we think we can help. Cloudflare empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost.

Empowering Kubernetes Security: JFrog's Seamless Integration with AWS AssumeRole

In the fast-paced environment of cloud-native apps, security and seamless connections are a priority. Many DevOps and SecOps professionals use Kubernetes native features to handle their container security, keeping a tight grip on access and secrets to improve security posture. The integration between AWS AssumeRole and JFrog Access in Amazon Elastic Kubernetes Services (EKS), enhances enterprise security by automating secrets management.

Secure your web apps running on Azure App Service with Datadog Application Security Management

Azure App Service is a platform-as-a-service (PaaS) commonly used to deploy applications and APIs, as well as functions, mobile apps, and more. It provides flexibility and reliability when deploying new applications and infrastructure, but it also introduces new security risks to your system. In particular, reduced visibility into the infrastructure and deployment of your application leads to a greater chance of application vulnerabilities being exploited by an attacker.

Snyk highlights AWS re:Invent 2023

With over 50,000 in attendance, AWS re:Invent 2023 had generative AI taking center stage at keynotes, race cars, and robots wowing at the Expo. Once again, Snyk showed up in a big way. Some of our highlights included being awarded the AWS ISV Partner of the Year in EMEA and UKI, achieving AWS Security Competency, and several new integrations with AWS services. Best of all, we got to meet all of you!

What Our Security Experts Discussed at AWS re:Invent 2023

The landscape of coding is changing as developers embrace AI, automation, microservices, and third-party libraries to boost productivity. While each new approach enhances efficiency, like a double-edged sword, flaws and vulnerabilities are also introduced faster than teams can fix them. Learn about one of the latest innovations solving this in a recap of what our security experts discussed at AWS re:Invent 2023.

Managing Multi Account AWS Console and CLI Access with Teleport

Are you using multiple AWS accounts to separate your environments like many of the engineering teams we work with? If you are, you may be looking for a better way to access those accounts. Join us for a session, in which Nivathan Somasundharam, Implementation Engineer at Teleport, and Ashok Mahajan, Senior Partner SA at AWS, discuss some common challenges that arise when using multiple AWS accounts to separate cloud environments and how to use Teleport to solve these issues. Some of the most common issues people face include.

Enhancing code to cloud security with the Common Configuration Scoring System

Proprietary severity scoring often burdens AppSec teams. With every new vendor, you must evaluate their custom severity framework and work to translate assessed risk between tools. To eliminate this burden and provide our customers with a clear security assessment for configurations across the SDLC, Snyk will be moving towards standardizing our code to cloud security rules set on the Common Configuration Scoring System (CCSS)!

Unlocking the secrets of a rock-solid cloud security game plan

So, you’ve dipped your toes into the cloud, chasing after that sweet combo of efficiency, scalability, and innovation. But, hold up – with great power comes great responsibility. It’s time to build up those digital defenses against all the lurking risks that come with the cloud craze.

Cloudflare 2023 Year in Review

This post is also available in 한국어, 日本語, Português. The 2023 Cloudflare Radar Year in Review is our fourth annual review of Internet trends and patterns observed throughout the year at both a global and country/region level across a variety of metrics. Below, we present a summary of key findings, and then explore them in more detail in subsequent sections.

The Future of Call Center Solutions: Embracing Cloud-Based Innovations

In customer service, call centers play a crucial role. Call centers serve as vital intermediaries between businesses and customers. Traditional call center methods are being transformed by innovative cloud-based solutions. This transition leads to smoother, faster operations and easier scalability. Looking to the future, we are excited about how these cloud-based changes will make customer service more personal and friendly.

5 Strategies for Successful Workload and Data Migration to the Cloud

According to the Flexera 2021 State of the Cloud Report, the cloud has already become “mainstream,” with organizations in almost every industry migrating into it in increasing numbers. Cloud migration refers to moving an organization’s digital assets from legacy, “on-premise” (on-prem) infrastructure to the cloud. That would include IT assets such as: Soon, 59 percent of organizations plan to focus on cloud migration.

Code Signing with Azure Key Vault: Create a Key Vault, Generate CSR and Import Certificate

In today’s digital landscape, where data security is paramount, protecting your private keys, generating certificates, and managing secure connections is crucial. Microsoft Azure KeyVault offers a robust and reliable solution for handling these critical security aspects. Follow the Video to Manage your Keys and Code Signing Certificates on Microsoft Azure KeyVault. You can Buy Code Signing Certificates for Azure Key Vault to Digitally Sign your Executables and Packages.

Keeper Security Report: Organizations Seek Cloud Advantages in PAM Solutions

Keeper Security has released the third part of its series on Privileged Access Management (PAM) research, the Keeper Security Insight Report: Cloud-Based Privileged Access Management, to determine what IT leaders are seeking in a PAM solution and the benefits of moving away from traditional, on-premises platforms.