Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Replicate is joining Cloudflare

We have some big news to share today: Replicate, the leading platform for running AI models, is joining Cloudflare. We first started talking to Replicate because we shared a lot in common beyond just a passion for bright color palettes. Our mission for Cloudflare’s Workers developer platform has been to make building and deploying full-stack applications as easy as possible. Meanwhile, Replicate has been on a similar mission to make deploying AI models as easy as writing a single line of code.

AWS & 1Password: Securing the agentic future: AI, trust, and what comes next

1Password CEO, David Faugno, and AWS Vice President of Americas Channels and Alliances, Christopher Sullivan, sit down to reflect on how organizations can harness the potential of AI without compromising trust, security, and real-world business needs. Learn how AWS and 1Password are collaborating to help global enterprises move fast, stay secure, and build for what’s next -- Visit 1Password in the Amazon Web Services Marketplace: 1Password.com/AWSMarketplace.

Cloud Migration Success Stories: 3 Real AWS Migrations

Searching for cloud migration success stories to validate your AWS journey? You’re making a smart move. Real-world examples prove what’s possible and help you avoid costly mistakes that businesses make when migrating without proper guidance. Cloud migration delivers clear competitive advantages: reduced infrastructure costs, improved scalability, enhanced security, and access to cutting-edge AWS technologies.

Security Visionaries | A Unified Approach to Identity, Network, and Data Security

In this episode of Security Visionaries, host Max Havey is joined by security leaders from Microsoft and Netskope to discuss how an ideal unified strategy brings together data, network access, and identity. They discuss what's currently "un-unified" about most security stacks and explore the topline benefits, key metrics, and the "non-negotiables" of a truly unified security approach. GUESTS: Sinead O’Donovan, VP of Product Management, Identity and Network Access at Microsoft.

Optimize Your Application Security with Custom WAF Rules

Your website is unique, and so are the attacks against it. Generic Web Application Firewall (WAF) rules protect everyone a little, but leave your site exposed to specialized attacks. Custom WAF rules are your line of defense against targeted threats—the ones tailored to your specific application, industry, or code base. Key Advantages of Custom WAF Rules.

Mastering cloud app control, Part 2: Hardening login security

In Part 1 of the cloud app control series, we explored how SinaraTech, a mid-sized ecommerce company, implemented access control to help reduce shadow cloud app usage by blocking risky or redundant sites. But the story isn't over yet. The SOC team had more nuanced challenges to be addressed. Let's continue down the road to find answers to those challenges.

Investigate Amazon EKS Audit Logs with Teleport Identity Security

In Teleport 18, we’ve added official support to import Amazon EKS Audit Logs into Teleport Identity Security. This capability allows teams to have visibility into actions performed on Amazon EKS clusters when those actions were not executed via Teleport. Amazon EKS Audit Logs in Teleport Identity Security will be generally available in Teleport 18.3, coming November 2025. Your browser does not support the video tag.

Atlassian Data Center to Cloud Migration: Why miniOrange Is Your Trusted Partner

Migrating from Atlassian Data Center to Cloud is a major step toward modernization. With miniOrange, the process becomes seamless, secure, and fully automated — ensuring no data loss or downtime. Our solutions help you manage users, licenses, and compliance effortlessly while enhancing security and performance. Move smarter and faster with miniOrange to unlock the full potential of Atlassian Cloud.