Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside Cybersecurity's New Arms Race with Vladimir Krupnov and Blake Darché

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by Vladimir Krupnov, Threat Intelligence Lead at Revolut, and Blake Darché, Head of Cloudforce One and Threat Intelligence at Cloudflare, to expose the evolving tactics of cybercriminals and what it really takes to stop them.

Shadow SaaS IS lurking in your organization. Here's what you need to know.

Is shadow SaaS lurking in your organization? The answer is "yes". Now, what do you do about it? User Risk gives security teams complete visibility into their human risk, enabling safe AI adoption, and driving a security-first culture. Discover more of what User Risk can do for you.

Flying blind on workforce security? Let User Risk be your co-pilot.

What we heard loud and clear from security teams is that they’re flying blind when it comes to securing their workforce. In fact, companies often have more SaaS applications than they do employees. They just don’t realize it. Secondly, there’s a tremendously long tail of SaaS applications only being used by one person in the organization. Imagine trying to imagine that manually. User Risk, solves this visibility gap by giving organizations visibility into your human risk, enabling safe AI adoption, and driving a security-first culture.

How Snowflake Saves 2,000+ Hours a Year with Vanta | Scaling Trust Through Automation

Video Disclaimer: The ROI visual in this video contains mock data from fictional companies and is intended for illustrative purposes only. It does not represent real customer data or actual performance metrics. How does Snowflake, the data-cloud company trusted by over 12,000+ customers, scale trust globally? Before Vanta, Snowflake’s trust team spent nearly 3,000 hours annually responding to repetitive security documentation requests. Now, Snowflake saves 2,000+ hours annually, accelerates sales velocity, and strengthens customer trust worldwide..

Platformization in Security: Why "One Platform to Rule Them All" Doesn't Exist

One platform to rule them all? Not quite. As Jay Wilson puts it, security stacks behave like a rubber band — always stretching between broad platforms and best-of-breed tools. No enterprise runs on a single vendor. But no one survives seventy, either. The real objective is coherence: a custom platform built from what your business already owns. That’s where Reach fits. ⇢ Unifies disparate controls into one operational view⇢ Bridges gaps as stacks expand or contract⇢ Turns your actual environment into a cohesive, measurable platform.

NIS2 Readiness in 90 Days | How EU Companies Can Avoid 2% Penalty Risks?

NIS2 is now active across the EU and companies can face fines up to 2 percent of global turnover if they fail to comply. This webinar explains who is in scope, what controls are mandatory, how incident reporting works and the fastest way to become NIS2 ready in 90 days. 1) Maximum fines: €10M or 2% global turnover (essential entities); €7M or 1.4% (important entities). 2) Typical reporting timeline companies are implementing: “24–72–30” — early warning within 24h, detailed notification within 72h, final report within 30 days (operationalization varies by Member State).

Azure Key Vault and Application Secrets and Certificates with Key Manager Plus

Managing certificates and client secrets across multiple Azure Key Vaults and applications manually? It's not just time-consuming, it's nearly impossible to do effectively. That's where Key Manager Plus comes in. Its seamless Azure integration gives you complete visibility and control over every certificate and secret across your Azure Key Vault and registered applications, all from one centralized dashboard.