Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One of the biggest cybersecurity myths out there?

One of the biggest cybersecurity myths out there? VPNs equal complete privacy. Here's what you need to know: A VPN hides your IP address, but it doesn't make you anonymous. Your VPN provider still has your data and logs and can hand them over if requested. Websites still track you through cookies, fingerprints, and browser activity. On the latest episode of The Connectivity Cloud Podcast, João Pedro Gonçalves and Michael Tremante break down why VPNs aren't the silver bullet they're marketed to be.

Cloudflare Bot Management Demo

Cloudflare applies a layered detection approach to Bot Management with several detection engines that cumulatively impact the bot score. Bot scores can be used in WAF rules to create granular security policies. This demo highlights how Cloudflare can help with several use cases including web scraping, account takeover, and AI bot protection. Additionally, Cloudflare's AI Assistant, Cloudy, is used to review additional bot analytics and create a WAF rule based on bot score and additional criteria.

Salt Security: Focused on Solving Real Business Problems

In today's digital landscape, APIs (Application Programming Interfaces) have become integral to business operations, enabling seamless integration and innovation. However, this increased reliance on APIs has also introduced significant security challenges. Salt Security offers a comprehensive solution to these challenges, providing organizations with the tools they need to protect their digital assets effectively.

FDA 21 CFR Part 11 - What Every Business Must Know?

Imagine a world where medications are not tested properly, medical devices malfunction frequently, or sensitive healthcare data is handled recklessly. Scary, right? That’s exactly why regulations like FDA 21 CFR Part 11 exist. The Food and Drug Administration (FDA) is an American federal agency that is responsible for protecting the public health by ensuring the safety of food, drugs, cosmetics, and medical devices.

Don't take the bait - How to spot and stop phishing scams

Some people might call bossware employee-sponsored spyware. Check out this article to learn more about employee monitoring software. The internet is a great place — until someone tries to steal your login credentials, credit card details, or even your entire identity. Enter phishing: the cybercriminal’s favorite way to trick you into handing over personal information. If you think you’d never fall for a scam, think again.

The State of NIS2: A Fragmented Implementation Across the EU

The Network and Information Systems Directive 2022 (NIS2) was designed to strengthen the cybersecurity resilience of critical infrastructure across the European Union. However, while member states were required to transpose NIS2 into national law by October of 2024, many fell short of this deadline. As a result, on November 28, 2024, the European Commission launched infringement procedures against 23 member states for failing to meet their obligations.

Exploring the Implications of DORA: A New Global Standard For Financial Cybersecurity

As of January 17, 2025, the Digital Operational Resilience Act (DORA) came into force across all European Union member states, with the crucial aim of strengthening the IT security of financial entities such as banks, insurance companies and investment firms. To do this, the regulation looks to standardize how financial entities report cybersecurity incidents, test their operational resilience, and manage third-party risk.