Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Build a Security Team That Actually Enables the Business with Olivier Busolini

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by Olivier Busolini, Group Head of Information Security at Mashreq, to explore how cybersecurity leadership has transformed from a purely technical function to a strategic business partnership.

What is Cloud Access Security Broker (CASB)?

Cloud apps make work easier, but they also open the door to new security risks. This blog unpacks everything you need to know, like: what is CASB in cyber security, how it works, and why it matters. We break down the core pillars of CASB, share real-world use cases, and help you understand the benefits it brings to your business.

ISO 27017 Cloud Controls: List of Tasks for Providers

Most of the time on the Ignyte blog, we talk about overarching security frameworks like FedRAMP, CMMC, and ISO 27001. Sometimes, though, it’s worth digging deeper into smaller-scale elements of these frameworks. Today’s target is ISO 27017, the ISO/IEC publication focusing on cloud service security. What does this document entail, who needs to use it, and what does compliance involve? Let’s discuss.

Why Traditional DLP Fails in the Age of Cloud and Collaboration Tools

DLP emerged at a time when corporate IT environments were relatively straightforward. Employees worked primarily from corporate offices, data resided in on-premises servers, and communications happened through company-managed email systems and file shares. Traditional DLP solutions were designed to thrive in this environment.

What is a Cloud-Native Security Automation Framework? Benefits & Use Cases

We live in a world where infrastructures reside entirely in the cloud, threats evolve faster than ever, and attackers never sleep. Manual security processes simply can’t keep pace. Cloud-native security automation is the critical solution for organizations to secure large attack surfaces.

"You can't have privacy without cybersecurity" - Building with Certifications in Mind

In this clip from This Week in NET, Emily Hancock, Chief Privacy Officer, and Rory Malone, Principal Privacy Compliance Specialist at Cloudflare, explain the deep connection between privacy and cybersecurity — and why certifications matter more than ever. They discuss Cloudflare’s approach to building with certifications in mind, including recent global data transfer certifications like CBPR and PRP. It’s all part of Cloudflare’s “show, don’t just say” philosophy: strong protections, audited controls, and real trust.

Onboarding DNS with Cloudflare

A step-by-step walkthrough on how to onboard your DNS to Cloudflare. Learn how to seamlessly migrate, optimize performance and enhance security using Cloudflare’s powerful DNS features. Our expert will guide you through best practices, common pitfalls and advanced configurations to ensure a smooth transition. Whether you're new to Cloudflare or looking to refine your setup, this session will equip you with the knowledge to maximize reliability and speed.

Introducing the IONIX & Cloudflare Integration: Complete External Exposure Management and Protection

Today, we’re excited to announce a powerful new integration between IONIX and Cloudflare that enables organizations to comprehensively govern, manage and secure their entire external attack surface with confidence.

Content Independence Day: no AI crawl without compensation!

Almost 30 years ago, two graduate students at Stanford University — Larry Page and Sergey Brin — began working on a research project they called Backrub. That, of course, was the project that resulted in Google. But also something more: it created the business model for the web. The deal that Google made with content creators was simple: let us copy your content for search, and we'll send you traffic.