Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How building Cloudflare with Cloudflare helps developers (with Celso Martinho)

Celso Martinho is a Senior Director of Engineering at Cloudflare. He works across multiple teams from Radar to Workers AI in our new Cloudflare Lisbon offices. In this conversation, host João Tomé and Celso discuss the rapid growth of Cloudflare Workers, simplifying life for developers, and the importance of observability in AI. Celso also dives into how the challenges for developers have changed since the 1990s tech era and why he believes the Internet is still in its infancy.

Disable SELinux Security Configuration

Linux distributions come with Discretionary Access Control (DAC) preinstalled in them. A sudo user is usually created in a Linux system to work at root-level privileges. DAC system provides the sudo user with all the administrator rights which may be a security threat if the sudo user is not trustworthy. SELinux is a Mandatory Access Control (MAC) system that replaced traditional DAC systems in modern Linux OS. SELinux allows the system admins to have more control over who can access the system.

Best Web Scraping Courses Available in 2024

Looking for the best web scraping courses but don’t know where to start? We’ve curated a list with the best ones available online. From Python libraries to JavaScript frameworks, these comprehensive courses cover a wide range of tools and techniques to help you master web scraping. Whether you’re a beginner or an experienced programmer, you’ll find one that suits your needs.

Power up Your Projects: Unleashing the Potential of Linux VPS Rental

In today's digital age, having a reliable and powerful hosting solution is essential for businesses looking to establish a strong online presence. One such solution that is gaining popularity among businesses of all sizes is Linux VPS rental. This article will delve into the benefits of using Linux VPS for your projects and how it can help power up your online endeavors.

[Eye Opener] Attackers Don't Hack, They Log In. Can You Stop Them?

The latest trend in cybercrime is that attackers don't really focus on “hacking” in; they’re logging in. We see this now in the wild, driven by organized criminal groups like Scattered Spider and BlackCat, who’ve reemerged with a renewed focus on gaining access through legitimate means, often exploiting help desks and social engineering tactics.

Five worthy reads: How non-human identities are shaping the cybersecurity landscape

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week’s article elucidates what non-human identities are and why they are garnering attention today. Undoubtedly, today’s digital environment is burgeoning with technological advancements across various spheres, and cybersecurity is no exception. We are in an era where automation, cloud computing, and AI play a more critical role than humans.

Workforce security redefined: Persona and Okta partner to verify identities and protect against phishing and deepfakes

Enforce identity verification throughout the employee life cycle using Persona and Okta’s out-of-the-box integration for identity verification. Joshua Rodriguez is a product marketing manager at Persona focused on our Graph product and financial institution and public sector verticals. You'll find him around the Bay Area exploring museums with his wife and young daughter.

Security Questionnaire Automation vs. RFP Software: Choosing the Right Tool

RFPs and security questionnaires play an important role in the sales and procurement process, helping buyers evaluate potential vendors and ensuring all necessary criteria are met before entering the contract phase. Despite their importance, the process can be arduous for both buyers and vendors, necessitating the development of tools that are designed to simplify and streamline these tasks.

Unify and Automate TDIR Workflows with Splunk SOAR 6.3 and Splunk Enterprise Security 8.0

Security teams are juggling 25+ different security tools that perform different actions across detection, investigation and response. Look up an IP here, send malware to a sandbox there, block an executable over there. What’s worse is that the vast majority of those actions are being performed manually. This approach is simply too slow against fast-moving attackers and malware, and it certainly isn’t sustainable.