Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

The Benefits and Challenges of Decentralized Cloud Computing for Modern Companies

Cloud computing has changed the way companies process and store their data. It has allowed for more flexibility and has given companies the ability to access their data and conduct operations from remote locations. This has allowed companies to recruit and manage employees who live outside their office locations, giving them access to global talent while saving costs.

The IT Hour | Mobile Device Trust 06.28.24

Sergey Belous, Principal Product Manager joins us to announce the highly anticipated Mobile Device Trust! Join us at 11:30 am ET The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.

How to Enhance Ubuntu Security: Advanced Features and Techniques

Jump to Tutorial Ubuntu, a popular Linux distribution, is known for its robust security features. There is always space for improvement once you install a fresh operating system, so in this article, we will guide you through the advanced techniques and features to enhance the security of the latest Ubuntu 24.04 version. There are multiple layers of security that Ubuntu offers out of the box, but we can implement additional steps that can further protect your system from threats.

Creating Users Manually | JumpCloud University Tutorial (2024)

In this tutorial, we will go over how to create a user in JumpCloud manually. This method can be used when you need to add a single user. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Cloud Security Compliance: Ensuring Data Safety in the Cloud

Modern organizations know that protecting their data is absolutely critical. That’s where cloud security compliance comes in. Satisfying regulatory standards helps organizations protect against unauthorized access and data breaches, as well as other security incidents. Beyond protecting data, compliance also protects organizations from the legal implications and financial effects of attacks.

What Drives an SME's Approach to Implementing AI?

AI’s rise in both the business and consumer worlds has been astonishingly exponential. Businesses are using AI to generate content, analyze data, automate processes, and more. But small and medium-sized enterprises (SMEs) look and act very differently from their enterprise counterparts. This prompts the question: How are SMEs approaching AI? Recent data from a 2024 JumpCloud study of SME IT may help answer it.

Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security

We’re thrilled to share that the CrowdStrike Falcon sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes deeper into the integration and shares how customers leveraging Google Cloud Run and CrowdStrike can deploy Falcon quickly to enhance their serverless security requirements.

JUMPSEC Red Teaming in the cloud forecast for the future

A red teamer’s forecast – Cloudy with a chance of hacks Our adversarial simulation team will outline how attackers exploit cloud infrastructure and offer strategies to counter their efforts. Key insights involve recognising significant security risks in cloud adoption, including emerging attack vectors, comprehending hacker tactics in cloud settings, and swiftly implementing effective measures to safeguard cloud environments.

Configuring RADIUS | JumpCloud University Tutorial (2024)

In this tutorial, you'll see how to configure JumpCloud's Cloud RADIUS for your organization, Wireless or VPN networks. JumpCloud's Cloud RADIUS allows you to use either JumpCloud or Azure AD as your identity provider. Cloud RADIUS also supports Certificate Based Authentication, allowing you to bring your own certificates for Passwordless authentication. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Riscosity Is Now Available on the AWS Marketplace

Starting today, Riscosity is available on AWS Marketplace, a digital catalog of software listings from independent software vendors that makes finding, testing, buying and deploying software that runs on Amazon Web Services (AWS) simple. This new partnership enables companies using AWS cloud services to easily purchase a Riscosity license directly from the marketplace, streamlining risk management and the deployment of Riscosity into their current security stack.

How Cloudflare accelerates digital modernization efforts

You need to accelerate digital modernization to stay competitive, but complex tech stacks limit your modernization initiatives. Cloudflare’s connectivity cloud simplifies management and new tech adoption across networks, web apps, security, and development, making it easier to embrace a wide range of digital services.

3 Crucial Capabilities for Effective Cloud Detection and Response

Adversaries are increasingly attacking cloud environments, as evidenced by a 75% surge in cloud intrusions year-over-year in 2023. They are also getting faster: The fastest breakout time was clocked at just over 2 minutes, according to the CrowdStrike 2024 Global Threat Report. Today’s adversaries are outpacing legacy security approaches. Disjointed point solutions can’t scale or provide visibility into a rapidly growing attack surface.

What is a CDN (Content Delivery Network) and How does a CDN Work?

In this video, we explain what a Content Delivery Network (CDN) is and how it works to improve your website’s performance. If you've ever experienced a slow website, you know how frustrating it can be for both you and your visitors. A slow website can lead to losing customers and lower rankings on search result pages. That's where a CDN comes in. A CDN improves your website's loading times by serving content from the server closest to your visitors. By caching content at various data centers, a CDN reduces the distance data must travel, leading to faster load times and lower bandwidth costs.

What is a DNS (Domain Name System) and How Does a DNS Work?

Explore the essential role of DNS (Domain Name System) in the internet ecosystem with this detailed video. Whether you're navigating the web or managing websites, understanding DNS is vital for optimizing website loading speeds and bolstering cybersecurity.. In this video, we cover: Whether you're a beginner curious about internet infrastructure or a tech enthusiast seeking deeper insights, join us as we unravel the mechanics of DNS. This video provides invaluable knowledge to empower you in navigating the digital world effectively.

Configuring Policies | JumpCloud University Tutorial (2024)

In this tutorial, we'll go over how to configure policies for your JumpCloud managed devices. You can use JumpCloud policies to remotely manage devices in your organization. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

The IT Hour | Product Roadmap on JCU 06.21.24

Nate Copt joins to show us more on the new product roadmap in JumpCloud University. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.

Navigating the Hybrid Workplace: Balancing Productivity, Efficiency and Security

In today's digital workplace, we rely heavily on a wealth of collaboration solutions; in fact, these tools have become ingrained and part of our daily workflows. Despite hybrid working patterns and the return, for some, to a more traditional work environment, the continued reliance on collaboration apps remains strong. This presents opportunities and challenges for the IT teams tasked with onboarding and offboarding employees and effectively managing an ever-growing plethora of tools and apps.

Cloud Migration Simplified: SaaS Secrets and PAM Strategy

In the era of rapid digital transformation, organizations are prioritizing cloud transformation projects to enhance their operational agility, scalability and cost efficiency. However, this shift takes time and brings significant challenges, particularly in security and identity management.

Deep Dive into Application Security: Understanding Firewalls, Malware, and APIs

In this week’s episode, we explore how Cloudflare handles application security, current trends, vulnerabilities, and future expectations. Host João Tomé is joined by Michael Tremante, Director of Product from our Application Security team. We discuss the evolution of application security and its increasing relevance today. We also go into specific use cases, covering firewall security, malware, supply chain risks, and the critical task of monitoring various vulnerabilities, including zero-day threats.

How To Configure Secure Cloud Access with ServiceNow

Welcome to our comprehensive tutorial on configuring Secure Cloud Access Integration! In this step-by-step demo, we'll show you how to streamline your access request workflows with just-in-time privilege creation and policy management. Here's what you'll learn: How end users request access through the Secure Cloud Access interface. The process of sending these requests to Cloud Workspace Owners for approval. How ServiceNow displays and manages these access requests efficiently.

Adding macOS Devices with MDM | JumpCloud University Tutorial (2024)

In this tutorial, you’ll see how to add macOS devices to JumpCloud. This method is for any company-owned macOS device that was not added to your Apple ABM or ASM account and cannot use Apple's Automated Device Enrollment to enroll the device. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

TeraBox Unveiled: Dispelling Misconceptions about Its Origins

Welcome to TeraBox, an innovative cloud storage giant that encompasses all your digital assets on your device. Photos, documents and other files can be stored seamlessly for you with a click of the button. Curiosity normally leads to questioning; is it from China? No! Such a question would go against what we learn from Flextech Inc., an indigenous Japanese force in technology. Nestled in Tokyo, Japan, TeraBox goes beyond 200 million customers worldwide thus consolidating its top tier status in the sea of cloud storage solutions. See TeraBox live - this place where keeping your digital items is simple and easy as a pie. Among them is a complimentary provision of 1TB space which allows you to store unlimited amount of data for life. TeraBox Dives into Business Understanding the genes behind any commercial pursuit resembles comprehending its roots. It was under Flextech's banner that the first chapter of TeraBox unfolded in May 2020 and so far they are still leading the company. In addition, owning ISO security certification proves Flextech as one of those guaranteed places to keep user sanctum & data unharmed. The essence remained constant albeit change post-2024 metamorphosis; its every Chinese stake had been liquidated. Thus, there should be no doubt as to where it comes from-it does not bear any China imprints. Following its rebirth, newly designed TeraBox appealed to inhabitants of the global PANtheon while presenting itself across its canvas anew. The main idea that runs throughout it is quite rare in digital environment-a treasure trove that belongs only to TeraBox. This section highlights this point by talking about something unique about this kind of software specifically. Differentiating Aspects of TeraBox Storage Solution TeraBox has various unique features built into their storage solutions meant for different users' storage and safety needs. One outstanding feature of this service is the ability to automatically sync files on different devices. This means that any changes made in a file on one device will simultaneously be reflected in all other devices hence removing the need for manual updates. The platform's sharing function makes it easier for people to share files with others. Shareable links or targeted invitations can help users avoid sending cumbersome email attachments when they want to share files. It has also increased convenience in collaborative efforts through simplified file sharing process. With TeraBox, you do not have to install anything else but your favorite video editing software because you are already connected directly to its cloud interface thus you can watch your stored videos and listen audio music as well. Additionally, the software supports Full HD 1080P playback settings giving you an opportunity to adjust sound speed among other controls before playing back any saved clip. TeraBox should be given praise for their great service at competitive prices, which makes them an affordable option to people and firms looking for cheaper online storage solutions. You can choose TeraBox as one of your cloud storage solutions, either Free or Premium Plans. Both have a number of advantages. The Free Plan is characterized with 1024 GB of space which is more than enough. However, there are drawbacks in this choice such as intrusive adverts and lack of automatic video backup or cloud decompression. The Premium Plans on the other hand offer various exclusive features at a reasonable annual/monthly fee. Subscribers get access to up to 2048 GB of cloud storage among other benefits like superior quality video playback, cloud decompression ability, automatic video backup and accelerated uploading speeds. Also, they can store and upload files up to 128GB in size which helps in improving their experience in managing data. Introducing the TeraBox Referral Initiative In addition to plain digital storage utility, TeraBox introduces an opportunity for profitable ventures. The TeraBox referral initiative presents opportunities for "earning profitably" via dissemination or accumulation of digital content. This has been globally commended by denizens within the cyberspace who wish to take part in it. These prerequisites of "enrollment, subscription selection, file upload, link dissemination and reward accrual" create a five-step induction process that is streamlined yet profound. It allows members to easily monetize their participation within the confines of the Referral Initiative themselves. Prizes Can Be Found Through Various Channels, check here to see how it work: 1. Videographic Referrals: Get $2.9 per every 1k views using TeraBox's medium visual collection.Another promising revenue stream awaits you where you earn $163 from just 1k daily views or $182 from 18k weekly views. 2. Patronage Referrals: The very essence behind referrals involves bringing new converts into the TeraBox family. Such a new member, brought via your referral link, comes with an earning potential of up to $0.5. If 200 daily sign ups are assumed, weekly earnings can rise up to $182 which is testament to your ability as a referrer. 3. Elite Subscription Referrals: The more premium TeraBox tiers that patrons choose on your referred links the better you earn. You will get bounties if you have ad impressions on your content and this will ultimately give you back 50% of the membership fees paid via shared links. Queries From Users Is Your Data Safe With TeraBox? One of our users may worry about his/her data safety. Our guarantee is "yes." This company has made sure that no one can hack into its system by developing such strong security measures as SSL encryption, a two-step verification process and around-the-clock data protection team who never sleep at work. So, rest easy! Don't doubt -give us all personal information and let us protect it. Who Owns TeraBox Cloud Storage? There have been questions about the ownership of our reputable cloud service. It should be noted that TeraBox belongs solely to Flextech; a prominent Japanese brand and not connected in any way to China as some people tend to think. The Preeminence of TeraBox Over Others? Distinct characteristics that are very rare in the peers of TeraBox are what it is hailed for. For example, this includes 1 Terabyte giveaway storage space which is a wealthy source for all your files, pictures and videos. Additionally, our premium tier has unmatched features that make each user happy. Consequently, it is undeniably better than its counterparts in the realm of cloud storage solutions. Bottom Line TeraBox serves as a ray of hope to those struggling with storage space challenges though some people doubt if it is from China. However, TeraBox's connection lies within Flextech Inc., with its roots tracing back to Tokyo Japan. As such, there can never be any question about whether it is a Chinese based company. The new age file storage solution centralizes data management and offers unequaled storage volumes at an effortless click. TeraBox leads the pack with blazing fast upload speeds ahead of competitors. In terms of privacy and security protocols for clients' data, TeraBox builds absolute confidence among users. Take up TeraBox today and settle your storage problems without any regrets.

Extend Attack Surface Visibility to AWS, GCP, and Azure with Bitsight

Bitsight excels at using externally available data to paint a detailed picture of organizations’ digital footprint, including assets, organizational hierarchy, third-party relationships, and risk posture. But as more IT resources shift to cloud service providers, gaining complete and precise visibility into your external attack surface becomes increasingly complex.

New Secrets Management Capabilities: CyberArk Secrets Hub, CyberArk Conjur Cloud, CyberArk Conjur Enterprise, CyberArk Credential Providers

We’re excited about several new Secrets Management capabilities that we announced at IMPACT 24 in Nashville and around the globe on the IMPACT World Tour. These include CyberArk Conjur Cloud support for Self-hosted PAM, CyberArk Secrets Hub support for Google Cloud and dramatic performance improvements for the Credential Providers with Release 14. AWS also demonstrated their new ”Managed By CyberArk“ capability in the AWS Secrets Manger UI.

Storage Born in the Cloud

Storage Born in the Cloud Current estimates show that humans are generating more than 325 million terabytes of data – every single day. That’s an enormous amount of information, and organizations are struggling to manage it. As organizations grow, the data they are managing across business solutions, applications, and end users will continue to increase radically. This data is usually unstructured, often containing multiple different formats and media.

Automate security controls from development to production on Google Cloud

To help businesses develop fast and stay secure, Snyk prioritizes seamless compatibility with developers’ existing workflows. In other words, every major tool or environment a developer touches in their everyday work can interface with Snyk tooling. This compatibility includes partnerships with major cloud providers like Google Cloud.

Cloud HSM vs On-Premises HSMs: Choosing the Right Encryption Solution

Data security is one of the most important issues in the modern world, and companies must ensure that all their important information is kept out of cyber criminals’ reach. As technology evolves and more data becomes increasingly vulnerable to cyber-attacks and illegal access, security remains critical for organizations that want to protect their sensitive information.

Difference Between Software Protected and HSM Protected Keys in Azure Key Vault

Data protection is featured in the decisive place in discussions, where the slogans of various organizations have something to say. The implementation of this in relationships and networks is becoming the chosen path. With the skyward movement of cloud computing, the demand for a reliable critical management facility has become a must.

Configuring LDAP | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover how to configure Cloud LDAP, Cloud hosted LDAP gives you the power of LDAP protocol with none of the usual setup, patching, and maintenance, or failover requirements of traditional LDAP implementations. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

A Primer on Idempotence for AWS Serverless Architecture

In programming, the term idempotence may sound like a complex and arcane concept reserved for mathematical discussions or computer science lectures. However, its relevance stretches far beyond academia. Idempotence, also called idempotency, is a fundamental principle that is pivotal in ensuring software systems’ predictability, reliability, and consistency.

12 Pros and Cons of Microsoft (Azure) Sentinel

Let’s keep it real: security compliance often makes your DevOps team feel strained. This burden spans multiple security sub-domains, such as information, network, and endpoint security, and specific security configurations, such as Identity and Access Management (IAM). Restraining budgets and ambitious expansion plans make it even more tempting to brush security under the rug until it becomes a challenge too big to ignore.

The IT Hour | Roadmap Webinar Recap 06.14.24

Chase Doelling, Principal Strategist will join us with all the latest from the most recent Roadmap Webinar. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.

Crafting a Robust Cloud Security Strategy in 2024

As cloud computing has evolved, we’ve entrusted more and more of our data to it. Our everyday correspondence is in the cloud; our favorite applications are in the cloud; and, more and more, our most sensitive data is in the cloud. To protect the integrity of your organization’s assets, you’ll need a comprehensive cloud security strategy. However, the cloud isn’t a single piece of hardware or software.

How to Migrate CentOS 7 to AlmaLinux

Jump to Tutorial As of June 30, 2024, CentOS 7 will reach its end of life (EOL). That means it will no longer receive updates, bug fixes, critical security patches, or any new features. It is very important to migrate to a supported operating system to maintain the functionality and security of your systems. AlmaLinux is a reliable alternative to CentoOS. It’s a community-driven enterprise distribution that is binary compatible with Red Hat Enterprise Linux (RHEL).

Amazon S3 Data Protection: The Myths and the Facts

So, you’re all set up with Amazon Simple Storage Service (Amazon S3), because you’re looking for best-in-class solutions for your company’s structured and unstructured data. Smart. But there’s more to do. Here are some myths about your Amazon S3 data, the real story behind them. Phew! We’re glad you agree that your Amazon S3 data needs strong protection. Wise decision. Here’s where we can help with a faster, cheaper, better solution.

What is Cloudforce One. How we thwarted FlyingYeti's campaign targeting Ukraine

In this week’s episode, we have a segment about how we thwarted a threat campaign targeting Ukraine and explain what our team, Cloudforce One, does. Host João Tomé is joined by Blake Darché, Head of Cloudforce One. First, we discuss how Cloudforce One employed proactive defense measures to successfully prevent Russia-aligned threat actor FlyingYeti from launching their latest phishing campaign targeting Ukraine.

Celebrating 10 years of Project Galileo (with Alissa Starzak)

Alissa Starzak, Global Head of Policy at Cloudflare, about our Project Galileo that is celebrating 10 years. In June 2014, Cloudflare launched Project Galileo, a program which today provides security services, at no cost, to more than 2,600 independent journalists and nonprofit organizations around the world supporting human rights, democracy, and local communities.

Commands | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover how to add configure and run commands on your JumpCloud managed devices. JumpCloud commands allow admins to run custom commands via bash and PowerShell. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

8 Steps to Get Value from Azure Identity Protection

Today’s digital landscape is full of ever-evolving cyber threats. Securing your organization’s identities has become very important. Azure Identity Protection is a strong ally. It empowers you to strengthen your defenses and protect your most valuable assets: your users’ identities. This strong security service gives you a single view of potential weaknesses. It also gives you the tools to stop risks and react fast to incidents.

Cloud Infrastructure Security: 7 Best Practices to Protect Your Cloud Data

Most likely, your organization leverages cloud computing because of its practical advantages: flexibility, rapid deployment, cost efficiency, scalability, and storage capacity. But do you put enough effort into ensuring the cybersecurity of your cloud infrastructure? You should, as data breaches and leaks, intellectual property theft, and compromise of trade secrets are still possible in the cloud.

What is Azure code signing, and how can it improve security

Trust is fragile in software, especially in the fast-paced complexity of cloud environments. Code signing reinforces that trust by digitally proving your software’s authenticity and integrity. Breaches like the UnitedHealth Group incident remind us why this matters—compromised code has real-world consequences. The breach potentially exposed the sensitive health data of millions of Americans.

What is Google Cloud HSM? How to Protect Data in Google Cloud?

Google Cloud HSM (Hardware Security Module) is a cloud service offered by Google that delivers secure key storage and cryptographic operations within a hardware environment that is set apart from any other instances. In contrast to HSMs, these hardware devices originated for the purpose of keeping cryptographic keys safe and executing cryptographic operations in a secure, tamper-resistant manner.

Bring Your Own Key (BYOK) Explained: Gaining Control Over Cloud Encryption

Data safety has become a primary issue for business organizations of any scale as they move to cloud computing. With businesses using cloud services to save and run critical information, the development of confidence encryption and essential management techniques is paramount. Several security methods have become popular; bring your own key (BYOK) is among them.

Celebrating 10 years of Project Galileo

One of the great benefits of the Internet has been its ability to empower activists and journalists in repressive societies to organize, communicate, and simply find each other. Ten years ago today, Cloudflare launched Project Galileo, a program which today provides security services, at no cost, to more than 2,600 independent journalists and nonprofit organizations around the world supporting human rights, democracy, and local communities.

Snyk and AWS announce native Amazon EKS support directly from the AWS Management Console

We’re excited to announce that Snyk has now developed an AWS Marketplace add-on for Amazon Elastic Kubernetes Service (Amazon EKS), embedded directly into the AWS Management Console! Snyk joins a small number of approved ISVs around the globe, allowing customers to deploy a Snyk agent on Amazon EKS clusters using the same methods you would use to deploy native AWS services, either manually via the AWS Management Console or by using AWS’ command-line interface (CLI).

Adding Windows Devices | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover how to add your company's Windows devices to your JumpCloud directory leveraging the JumpCloud agent. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Safeguard Your Apps in the Cloud with Netskope and AWS

In our last blog post, we discussed how customers can accelerate cloud transformation with Netskope Borderless SD-WAN and AWS Cloud WAN integration. This network-level integration allows customers to automate workload access from any remote site and user laptop, delivering a secure, reliable, flexible, highly available, and optimized middle-mile network service leveraging the AWS global network.

Securing AI in the Cloud: AI Workload Security for AWS

To bolster the security of AI workloads in the cloud, Sysdig has extended its recently launched AI Workload Security to AWS AI services, including Amazon Bedrock, Amazon SageMaker, and Amazon Q. This enhancement helps AWS AI service users secure AI workloads and keep pace with the speed of AI evolution.

CrowdStrike Expands Support and Protection for AWS Services

At AWS re:Inforce 2024, CrowdStrike is announcing expanded AWS support to provide breach protection, enhanced visibility and faster response across your cloud environment. Let’s explore three cutting-edge CrowdStrike Falcon Cloud Security and CrowdStrike Falcon Next-Gen SIEM features that are changing the way organizations manage security risks.

How Managed Detection and Response Helps Protect Against Threats from Cloud Sprawl

As businesses continue to rely on cloud services for all sorts of applications, computing, and storage services, each with its APIs, they dramatically increase their attack surface. It’s a situation that results in prime breeding grounds for cyber threats and, therefore, drives the need for managed detection and response (MDR) services. Consider the software-as-a-service (SaaS) market. It has grown steadily from a $31.4 billion market in 2015 to $232.3 billion in 2024, according to Techopedia.

Cloud Penetration Testing: Tools, Methodology & Prerequisites

Businesses increasingly migrate to cloud-based solutions for storage, applications, and critical functions. While the cloud offers scalability and agility, it also introduces new security challenges. Cloud penetration testing is a crucial defence mechanism for proactively identifying and addressing these vulnerabilities.

The IT Hour | Password Manager Updates 06.07.24

Himanshu Sharma, Product Manager, joins us to give us all the latest on the JumpCloud Password Manager. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.

Alissa Starzak on Internet regulation, elections, and Project Galileo's decade

In this week’s episode, we feature a segment all about policy, Internet regulation, and the 10th anniversary of our Project Galileo. Host João Tomé is joined by Alissa Starzak, Global Head of Policy at Cloudflare, to discuss policy and regulation in 2024. This conversation was recorded in early May 2024 in our San Francisco office. We begin with Alissa’s impressive background, from the private sector to the CIA, the US Army, and then Cloudflare.

Internxt vs Google Drive: How to Protect Your Files from Google

Have you ever really asked yourself why you’re using Google Drive? Sure, they give you a generous amount of free storage and other features, but at what cost? The privacy of your files. Signing up for Google Drive may seem like a good product to help you store your files online, but Google holds all the power when it comes to: As we live in an era centered around technology, the risks to our data increase.

CrowdStrike Wins Frost & Sullivan 2024 Cloud Leadership Award

Frost & Sullivan named CrowdStrike the winner of its 2024 Customer Value Leadership Award in the global cloud security industry, reinforcing our dominance in cloud security at a time when the practice has never been more critical for organizations worldwide. According to the CrowdStrike 2024 Global Threat Report, cloud intrusions grew 75% year-over-year in 2023, with adversaries becoming more focused and persistent in the cloud.

Revolutionizing cloud security: Panoptica's CIEM and the battle against identity threats

Imagine a scenario where an attacker, unnoticed, gains access to your cloud infrastructure, manipulating identities and permissions to steal sensitive data or disrupt operations. In the rapidly evolving world of cloud computing, managing and securing cloud identities has become more critical than ever. Identity-based threats are growing exponentially, and traditional security measures are no longer sufficient.

Three Questions to Ask About Your Cloud Security Posture

For most organizations, the decision to adopt cloud technologies is a simple one. Cloud apps streamline operations and costs while enabling users to access resources from anywhere and on any device. But migrating to the cloud has also introduced some complexity, which comes with new risks. Instead of everything residing neatly within your corporate perimeter, your data now resides within countless apps and is being handled by users and endpoints that operate outside of your sphere of influence.

New Phishing Tactics: Cloudflare Workers, HTML Smuggling, and GenAI

Cybersecurity researchers are ringing the alarm on new phishing campaigns exploiting Cloudflare Workers, HTML smuggling, and generative AI (GenAI) to target user credentials. These innovative techniques highlight the sophisticated strategies cybercriminals are deploying to bypass security measures and harvest sensitive information.

Wireshark: Ethereal Network Analysis for the Cloud SOC

Remember Wireshark from the good old days of your IT degree or early engineering adventures? Well, guess what? It’s still kicking and just as relevant today as it was back then, and guess what else? It is still open source! Do your engineering or security teams use it? There’s a good chance they do if you’re on-premises. Believe it or not, Wireshark isn’t just for the land of wires and cables anymore. With some help from Falco and Kubernetes, it has a place in the cloud SOC.

Unlocking Deeper Cloud Security: Panoptica Unveils Additional Capabilities at CLUS

In today' s dynamic cloud landscape, the demand for a sophisticated, all-in-one security platform is paramount. Panoptica meets the challenge head-on, empowering security teams with actionable insights that enhance their security posture.

Policy Enforcement Redefined: Panoptica Integrates with Multi-Cloud Defense making it the first CNAPP solution to expand into Network Security

In the dynamic landscape of cybersecurity, the integration of cutting-edge technologies is paramount to stay ahead of evolving threats. In this pursuit, the fusion of Panoptica’s robust capabilities with Multi-Cloud Defense emerges as a game-changer. This groundbreaking integration not only fortifies organizations against multifaceted risks but also establishes a new paradigm in policy enforcement for unparalleled security.

Key metrics for monitoring AWS WAF

AWS WAF is a managed web application firewall that monitors network traffic to your AWS applications and resources. As a perimeter-based firewall, AWS WAF is designed to secure the boundaries between your applications and the public internet. This means that it’s capable of protecting all of the various elements of your AWS architecture, including Amazon API Gateways, load balancers, and Amazon CloudFront distributions.

Monitor AWS WAF activity with Datadog

In Part 2 of this series, we looked at Amazon’s built-in monitoring services for AWS WAF activity and audit logs. In this post, we’ll demonstrate how Datadog complements your WAF’s existing protection and extends its capabilities to not only offer protection at the perimeter but also to the APIs and services within your network.

Triage Your Cloud Security: Risk Prioritization Methods

It’s a familiar post-disaster scene in seemingly every television medical drama. A ferry has crashed, or a train has derailed. Patients flood into the ER, each requiring urgent medical attention. The impossibly attractive medical staff must quickly assess and prioritize patients based on the severity of their injuries and the likelihood of survival. Someone with great hair likely says an inspiring quote and jumps immediately into action.

Cloud Cross-View for Complete Attack Surface Visibility

IONIX’s Cloud Cross-View (CCV) uses cloud integrations to broaden the scope of attack surface mapping and coverage beyond traditional methods of monitoring. CCV extends asset analysis to consider aspects that are specific to cloud environments. This complements CSPM and CNAPP solutions by enriching them with broader attack surface data obtained through IONIX’s EASM capabilities.

Building Cyber Resilience Amid Azure Migration

With ransomware increasing and a complex, business-critical cloud migration on the horizon, BSM, one of the world’s largest shipping companies, was seeking a solution to monitor its environment for potential threats, both now and in the future. Working with Kroll gives the company greater visibility across its global network of offices and ships to better detect and respond to threats.

New Transparent Phishing Attacks Leverage Cloudflare Worker Serverless Computing

An increasing number of phishing campaigns from several threat groups are being tracked as they leverage legitimate Cloudflare services as part of account compromise attacks. Security analysts at Netskope take an expository look at the misuse of Cloudflare services for the purpose of enabling phishing attacks that leverage HTML Smuggling and Transparent Phishing tactics. We’ve seen HTML Smuggling attacks for several years, including its continued use this year.

H1 2024 Platform Vision, Roadmap, and Review

Many organizations struggle with handling BYOD and mobile devices. Permitting those devices to access resources poses a larger challenge for governance, risk, and compliance (GRC). Questions of how to deploy approved apps and updates remain unresolved. It’s an even greater struggle when legacy Active Directory infrastructure is added to the mix. The temptation to piece together a strategy with point solutions can be met with resistance from IT directors who favor consolidation.

How CASB and DLP Work Together to Safeguard Data

Cloud computing has changed the way we work, and mostly for the better. Widely available cloud applications let us create new documents, access our existing files, and communicate with our coworkers from just about anywhere. However, cloud computing has also created new data security and privacy concerns. A comprehensive CASB DLP policy can help address these concerns and keep your organization’s data exactly where it belongs.