Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Stop brand impersonation with Cloudflare DMARC Management

At the end of 2021 Cloudflare launched Security Center, a unified solution that brings together our suite of security products and unique Internet intelligence. It enables security teams to quickly identify potential security risks and threats to their organizations, map their attack surface and mitigate these risks with just a few clicks. While Security Center initially focused on application security, we are now adding crucial zero trust insights to further enhance its capabilities.

Optimising PAM for Cost Savings and Stronger Security

It's imperative for organisations around the globe to properly secure their privileged credentials, accounts and sessions to protect their digital crown jewels from unauthorised breaches, yet traditional Privileged Access Management (PAM) solutions are failing enterprises. These solutions are proving too costly in many cases - and so complex in others - that many organisations are opting to shelve or never fully deploy their PAM products, saying they're wasting money on features they don't even use.

Top 10 Data Discovery Tools That Get Results

As businesses access larger and more intricate datasets, data discovery has become a key component in successful data analysis. By uncovering meaningful patterns and insights in datasets, data discovery helps organizations better understand their customers, products, and processes to enable optimum decision-making. With the correct tools and strategies, data discovery can be invaluable in helping organizations maximize the value of their data.

Security Operations Maturity Model I : Measuring SOC performance

Companies need to measure performance in all areas of operations to check whether they are proving cost-effective and achieving the desired results. One of the best ways for security managers to demonstrate that their security operations program is aligned with business objectives is to use metrics that demonstrate efficiency and effectiveness.

Vulnerabilities page updates: Major improvements to accelerate remediation

We know that most security teams today handle a backlog of thousands of vulnerabilities. We also know that not all of these vulnerabilities pose a significant risk to your organization, whether or not they have a high severity score or are present on a business-critical asset. We’ve spoken with dozens of security teams over the last few months and have learned that filtering vulnerabilities across several factors is critical to accelerating remediation.

The Risks of Using ChatGPT to Write Client-Side Code

Since OpenAI released its AI chatbot software ChatGPT in November of 2022, people from all over the internet have been vocal about this program recently. Whether you love this software or despise it, the bottom line on it seems to be that the technology behind ChapGPT isn’t going anywhere. At least not in the near-to-distant future, it seems. Those who have been curious can try out this enhanced conversational AI software, have found that their results are often varied when using ChatGPT.

8 Ways to Maintain Data Security While Preserving Employees' Privacy

‍ In my previous blog, I shared details about the global proliferation of data privacy regulations, including the fact that at least 10% of U.S. states will be covered by stronger data privacy regulations by the end of 2023. However, an interesting trend has emerged: Newer regulations such as the California Privacy Rights Act (CPRA), General Data Protection Regulation (GDPR), and Brazil’s Data Protection Law (LGPD) all regard employees’ personal data as highly-sensitive.