Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How the April 28, 2025, power outage in Portugal and Spain impacted Internet traffic and connectivity

A massive power outage struck significant portions of Portugal and Spain at 10:34 UTC on April 28, grinding transportation to a halt, shutting retail businesses, and otherwise disrupting everyday activities and services. Parts of France were also reportedly impacted by the power outage.

Targeted by 20.5 million DDoS attacks, up 358% year-over-year: Cloudflare's 2025 Q1 DDoS Threat Report

Welcome to the 21st edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the first quarter of 2025.

Sunil Pai about Agents, AI, and New Developers

Clip of the show/podcast with Sunil Pai. About exploring AI, agents, developers, and how AI is helping developers, and turning more people into developers. Sunil is the founder of PartyKit (an open source deployment platform for AI agents), acquired by Cloudflare in 2024. And he’s a Principal Systems Engineer that is building AI agents at Cloudflare.

Opti9 Technologies Achieves AWS Premier Tier Status

Opti9 Technologies, a leading managed services provider specializing in cloud, security, and application modernization, recently announced that it has achieved Amazon Web Services (AWS) Premier tier in the AWS Partner Network (APN). Achieving AWS Premier Tier Services Partner status distinguishes Opti9 as a proven leader in designing, architecting, migrating, and managing workloads on Amazon Web Services (AWS), demonstrating deep expertise and a strong track record of customer success.

Secrets are Dead: Why Machine and Workload Identities are the Future of Cloud Security

Static secrets like API keys, tokens, and passwords have become a major security liability in modern cloud environments. These credentials introduce significant security risks, are difficult to manage at scale, and create compliance headaches. The future of cloud security lies in dynamic, cryptographic machine and workload identities, eliminating static secrets and enforcing zero-trust authentication across your infrastructure.

Protecting Public Sector Websites and the critical systems behind them: link to the hosted On-Demand

Your agency’s website is more than just a landing page—it’s where constituents find information, apply for services, and engage with their government. It’s your digital front door. But security doesn’t stop at the homepage. Behind every online form, data portal, and public-facing interface, there’s a complex infrastructure that needs just as much protection.

5 Elements for a Robust Security Strategy GovLoop and Anish Patel

Agencies are tasked with protecting their networks from cyberattacks, but there is no longer a perimeter that makes it easier to defend. Instead agencies need to rethink how they secure every device connecting to an agency network. Considering the number of connected devices — hundreds of thousands — it's best to ensure sound security. Specifically, you’ll learn.