Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Modern Approach to Managing Vulnerabilities

Organizations today rely on an increasing number of applications installed on enterprise devices just to “keep the lights on” and business functioning. Being able to immediately access emails, files, communications, and web conferencing tools has never been more critical with the rise of remote and hybrid work.

SSE Leader. Again. Why Netskope Keeps Hitting the Mark.

Today we are thrilled to announce that Netskope has once again been named a Leader in the Gartner Magic Quadrant for Security Service Edge (SSE). This is the fourth year in a row Netskope has been recognized as a Leader, and we have been recognized as a Leader every time since the inaugural 2022 Magic Quadrant for SSE.

Building a Secure Foundation: Compliance-Driven API Posture Governance

APIs are the vital connectors of modern digital business, powering everything from e-commerce and financial transactions to healthcare data exchange and government services. While indispensable for innovation, this widespread API adoption introduces significant security risks.

Cloudflare named a Strong Performer in Email Security by Forrester

Today, we are excited to announce that Forrester has recognized Cloudflare Email Security as a Strong Performer and among the top three providers in the ‘current offering’ category in “The Forrester Wave: Email, Messaging, And Collaboration Security Solutions, Q2 2025” report. Get a complimentary copy of the report here. According to Forrester.

What to Look for When Selecting Your MSSP

I’ve been in the security business, and specifically cybersecurity, for the majority of my adult life. Throughout my career, I’ve noticed trends of decision-making that organizations often follow, both good and detrimental for their security posture. Of these trends, I’ve found that choosing the right Managed Security Service Provider (MSSP) is one of the most critical decisions you can make for your organization.

Complete Guide to Kubernetes PVC Backup and Management

Organizations running Kubernetes face a wide range of potential data loss scenarios—not just security incidents. From hardware failures and software bugs to accidental deletions and misconfigured automation scripts, these risks make robust PVC backup and disaster recovery strategies essential for maintaining application resilience. This guide focuses on practical kubernetes PVC backup strategies that help protect your containerized applications from data loss.

Do we need an AI compliance framework?

Compliance isn’t just a checkbox. It’s the frontline of cybersecurity defense. In this episode of the Cybersecurity Defenders podcast, Joshua Hoffman, Chief Revenue Officer at ControlCase, shares critical insights on the evolving role of compliance in cybersecurity. From frameworks like CMMC and SOC 2 to the rising pressure from new SEC regulations, we examine how organizations can move beyond surface-level audits and adopt a scalable security posture.

Cloud Detections in an Age of Cloud Tools with Fred Wilmot

Fred Wilmot, CEO and Co-Founder of Detecteam, joined Defender Fridays to discuss the growing concerns surrounding identity management in cloud security, particularly with the rise of attacks on platforms like O365 and Azure. He emphasizes the importance of analyzing network traffic to understand identity behavior and the complexities introduced by encryption and third-party authentication. He also notes the ongoing evolution in cybersecurity practices and the potential benefits of standardization in logging and taxonomies.

What You Need to Know about the Coinbase Data Breach

Coinbase is a digital currency platform that allows consumers to transact using digital currencies, including Ethereum and Bitcoin. It is one of the most popular exchanges, with millions of users. The company’s initial vision is to bring efficiency and innovation to the global economy. Despite significant security measures to secure the wallet and transactions, there was a breach in late 2024. It began when hackers targeted an employee using bribery in exchange for insider knowledge.

Protecting Your Address: What to Do if Someone Is Using It Without Permission

Most people aren’t overly protective of their home address. They don’t give it to anyone who asks, but they also don’t find it too suspicious when an e-commerce website or application asks for the information. However, your home address is a crucial part of your financial identity. It is common for an online transaction to fail because the consumer inputs the wrong zip code or street number.