Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Learning: It's copying everything we do!!! | AI Avenue: Ep 4

Don’t you hate it when your robot hand co-host tries to hijack your show? Yorick makes his OWN version of AI Avenue, prompting a conversation about ethics and learning in AI. Craig reaches out to experts like Amanda Haskell from @anthropic-ai to discuss how we can all use AI more responsibly. AMECA from @EngineeredArtsLtd makes a cameo to get Yorick in line. And Nick from @heygen_official swings by to make a new Craig Avatar, ethically.

Vanta signs a strategic collaboration agreement with AWS to deepen integration

We’re thrilled to announce that Vanta has signed a strategic collaboration agreement (SCA) with Amazon Web Services (AWS) to make it even easier for businesses to scale securely in the cloud. We’re expanding the reach of our compliance automation and trust management platform, enabling organizations to build stronger security programs, accelerate audit readiness, and demonstrate compliance more efficiently—all while scaling on AWS. ‍

Securing The Future: Cloudflare's Implementation of Post-Quantum Cryptography - Michiel Appelman

Explore how Cloudflare’s Post-Quantum Cryptography (PQC) capabilities are future-proofing enterprise security. Learn how we’re integrating PQC across our network to safeguard data against quantum threats, ensuring businesses stay protected in an evolving cryptographic landscape—without compromising performance or scalability.

CTEM Solutions Explained How to Build a Stack

Vulnerability numbers are spiraling. Compliance checklists and point scans cannot keep pace. Continuous Threat Exposure Management (CTEM) provides security leaders with a practical approach to identify and mitigate real attack paths in real-time. This article explains what CTEM is, the solutions that enable it, and how to build a stack that actually shrinks exposure instead of counting it. CTEM solves the eternal problem of vulnerability management (too many vulnerabilities to ever fix) with a continuous program to find, validate, and reduce exposures before adversaries can use them.

OCSF for Security Hub: Sumo Logic and AWS speaking the same language

In technology, the proof of a lasting relationship is in the infrastructure — the pipelines, security services, and log plumbing have to work seamlessly together long before anyone sees the outcome. That’s precisely what Sumo Logic and AWS have built. Aligned around open standards like OCSF (Open Cybersecurity Schema Framework), integrated with services like Security Hub and GuardDuty, and connected through shared telemetry, it makes cloud security and observability possible at scale.

Resilience by Design: How to Stay Online During Attacks and Outages

In today’s cloud-native world, resilience isn’t optional — it’s foundational. Daniele Molteni, Director, Product Management for Application Security at Cloudflare, is leading a panel at Cloudflare Connect 2025 that tackles a core question: how do you design systems to withstand attacks, outages, and failures? In this preview, Daniele shares what’s at stake when downtime hits — and how leaders are rethinking operational continuity for the modern Internet.

Top 8 Custom Software Development Trends in 2025

The world of software development never stands still. In 2025, we're seeing a surge of exciting innovations that are changing how software is designed, built, and scaled. From smarter AI tools and low-code platforms to greener coding practices and edge computing, the landscape is evolving fast. Whether you're a startup founder aiming to build a scalable MVP or a CTO steering an enterprise transformation, knowing what trends to watch can save time, money, and frustration.