Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The states of data, Part 2: Why visibility is key for protecting data at rest

In part two of our blog series, The states of data, we’ll be discussing the various threats to sensitive data at rest in the form of a case study on Morgan Stanley’s data breach. Before we delve into that, let’s look at what data at rest is and see a few examples of data at rest in an organizational context.

Why educational institutions need robust cybersecurity solutions

Technology has been an integral part of the education industry, even before the onset of the pandemic. However, the shift from traditional classrooms to online courses, virtual classrooms, and digital textbooks has taken place at a rapid pace since 2020. This transition to the digital world has widened opportunities, but it has also opened avenues for cyberattacks and compliance violations.

Accelerating Torq's Vision: Announcing Our Series C Funding Round

I’m excited to share some significant news that marks a pivotal milestone in Torq’s journey. We’ve successfully closed our Series C funding round, securing a $70M investment to propel our mission of revolutionizing SecOps through the Generative AI-based Torq Hyperautomation Platform and cutting-edge Torq HyperSOC solution.

Microsoft Copilot for Security - Proper Configuration is the Key

Microsoft Copilot for Security is a powerful new artificial intelligence tool that can help companies home in on credible cybersecurity threats amid an onslaught of noise. However, significant expertise is required to configure and operate it properly and avoid unnecessary costs. These are a few key takeaways from the webinar, "Getting Started with Microsoft Copilot for Security", presented by Dan Gravelle, Director of Global Solutions Architecture at Trustwave.

Top 7 User Activity Monitoring (UAM) Tools for 2024

Every step you take, every move you make, some company will be watching you. While user activity monitoring may sound invasive at first, the growing number of insider and external threats makes it compulsory for companies to understand how users interact with their systems. 43% of workers report their employer monitors their online activity, and this percentage rises to 48% for hybrid employees.

CCPA Compliance Guide: How to Get Your Business CCPA Compliant

Over the past few years, businesses have been fighting against the threat of data breaches and cyberattacks, and customers are trying to find new ways to protect their privacy online and keep their data safe from being shared with third parties. Since 2018, the California Consumer Privacy Act and others, such as the GDPR, have made it a legal obligation for companies to protect user data. As a result, other states are starting to follow suit.

Cloudflare partners with Internet Service Providers and network equipment providers to deliver a safer browsing experience to millions of homes

In 2018, Cloudflare announced 1.1.1.1, one of the fastest, privacy-first consumer DNS services. 1.1.1.1 was the first consumer product Cloudflare ever launched, focused on reaching a wider audience. This service was designed to be fast and private, and does not retain information that would identify who is making a request. In 2020, Cloudflare announced 1.1.1.1 for Families, designed to add a layer of protection to our existing 1.1.1.1 public resolver.

Cloudflare helps verify the security of end-to-end encrypted messages by auditing key transparency for WhatsApp

Chances are good that today you’ve sent a message through an end-to-end encrypted (E2EE) messaging app such as WhatsApp, Signal, or iMessage. While we often take the privacy of these conversations for granted, they in fact rely on decades of research, testing, and standardization efforts, the foundation of which is a public-private key exchange.