Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Giving users choice with Cloudflare's new Content Signals Policy

If we want to keep the web open and thriving, we need more tools to express how content creators want their data to be used while allowing open access. Today the tradeoff is too limited. Either website operators keep their content open to the web and risk people using it for unwanted purposes, or they move their content behind logins and limit their audience.

A simpler path to a safer Internet: an update to our CSAM scanning tool

Launching a website or an online community brings people together to create and share. The operators of these platforms, sadly, also have to navigate what happens when bad actors attempt to misuse those destinations to spread the most heinous content like child sexual abuse material (CSAM).

Enhancing the Git Restore Process with Azure DevOps and GitProtect

In this video, we will walk you through the new Git Restore process in GitProtect, highlighting its compatibility with platforms like Azure DevOps, GitHub, GitLab, and Bitbucket. We will explain how we can enhance the restore efficiency by using additional credentials and access tokens, allowing for more API requests. A key feature of Azure DevOps is the ability to restore repositories from the same backup set, ensuring consistency. I encourage you to add these additional credentials to GitProtect for a smoother experience.

What Is The Best Cloud Storage for Sensitive Data?

Cloud storage can offer us the best protection against data breaches, more privacy online, and a means to protect our photos, videos, and more to ensure we never lose access to our important files. However, due to the many options we have when choosing cloud storage, you may be left wondering which is the best cloud storage for sensitive data, and how these differ from the main cloud storage providers, such as Google or OneDrive.

Turning Cloud Security Best Practices into Action with XDR

What once seemed like an optional upgrade has now become mission-critical: cloud security sits at the heart of every business decision. Organizations know the playbook—they understand cloud security best practices inside and out. But here’s where things get complicated: there’s a massive disconnect between understanding these practices and actually implementing them across sprawling, multi-cloud environments.

MSP Zero Trust Analysis Map

Uncovering your clients’ hidden security gaps just got easier. Our new Zero Trust Gap Analysis Map helps you quickly identify where your clients are vulnerable, turning a complex topic into a clear, actionable conversation. In this video, we'll show you how to use this free, five-minute Google Sheets-based tool to assess a client's Zero Trust readiness. You'll learn how to pinpoint critical security gaps in key areas like identity, devices, and networks, generating an easy-to-read dashboard that highlights their biggest risks.

AWS Cost Optimization: How to avoid "Cost Creep".

Last quarter, a manufacturing client reached out with a serious AWS cost optimization challenge. Their AWS bill had grown from $22,000 to $38,000 per month over eight months, with no business growth to justify the increase. The CFO was threatening to abandon their cloud initiative entirely. After conducting our comprehensive AWS cost optimization audit, we identified $200,000 in annual waste and eliminated it within one week. Here’s exactly what we found and how we fixed it.