Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

In cybersecurity, it's an arms race.

In cybersecurity, it's an arms race. Stephanie Cohen explained why financial services are prime targets and why strong partnerships are the real armor. Banks are one of the most attacked sectors on the planet. It's not just money at stake; it's entire economies. And here’s the kicker: You're only as strong as your weakest link. Ready to rethink your cybersecurity strategy? Dive into the latest episode of The Connectivity Cloud Podcast.

Continuous Threat Exposure Management (CTEM)

Continuous threat exposure management (CTEM) is a structured framework for continuously assessing, prioritizing, validating, and remediating vulnerabilities across an organization’s attack surface, enabling you to respond effectively to the most pressing threats over an ever-expanding attack surface. Reactive security is a temporary fix, not a sustainable solution.

DDoS Attacks Up 358%: Early 2025 Breakdown with Omer Yoachimik

In this week’s episode, we talk about DDoS attacks and their sharp rise in recent months. We also start with a quick look at some Internet trends tied to the announcement of the new pope. To guide us through the world of distributed denial-of-service (DDoS) attacks, host João Tomé is joined by our DDoS expert, Omer Yoachimik.
Featured Post

Overcoming the Cloud of Uncertainty

The cloud industry has evolved significantly over the years, with VMware standing out as a key player in cloud computing, its reputation in the market helped it gain significant market share and facilitated a successful acquisition by tech giant Broadcom in November 2023. It has been over a year since this happened and, as with all acquisitions, it prompted companies to consider how it might impact their requirements.

Navigating the New Security Landscape: Asia Pacific Cybersecurity Readiness Survey 2024

A year on from the publication of our inaugural cybersecurity survey in 2023, it is remarkable to see how many of the same issues continue to impact the work of Chief Information Security Officers (CISOs) in the region. In the 2024 edition of the Cloudflare study, we continued to build a better understanding of the threat landscape facing CISOs and their teams across Asia Pacific; with interviews we conducted among almost 4,000 cybersecurity professionals from 14 markets across the region.

Practical Tips to Reduce AWS EC2 Backup and Storage Costs

Backing up data stored in AWS, such as EC2 instances, is essential to mitigate the risks of data loss events that can occur even in cloud environments. AWS cost optimization is a set of measures to save costs paid for AWS services related to data backup. These measures include preventing unnecessary data storage, optimizing storage and other practices. This blog post explains the nature of AWS pricing when backing up data.

CrowdStrike Falcon Cloud Security Extends Unified Protection to VMware Environments

Organizations are rapidly adopting cloud platforms to accelerate development, scale operations, and optimize efficiency. VMware’s robust cloud solutions, including VMware Tanzu Platform and VMware vCenter, are among the critical tools that empower teams to build, deploy, and manage workloads with ease. However, this evolution brings new security challenges. Virtual machines, container images, and other cloud assets can become attack vectors if not properly protected.