Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The hardware that powers Cloudflare: AI-capable Gen 12 servers and more

Join host João Tomé and Cloudflare’s Head of Hardware Engineering, Syona Sarma, for a discussion on Cloudflare’s latest Generation 12 hardware innovations, broadcast from the Lisbon office. As Cloudflare expands its global network across over 330 cities and 120 countries, explore how the company is evolving its hardware infrastructure to meet the demands of modern technology, particularly in the AI era.

Mastering Ransomware Defense For Small Businesses

Ransomware poses a significant threat to small businesses by locking critical data and demanding hefty ransoms. Understanding the mechanisms and vulnerabilities exploited by cybercriminals is crucial in safeguarding your operations. This guide will walk you through practical steps to fortify your defenses, detect threats early and ensure swift recovery.

Understanding the Role of a Partition Lawyer in Real Estate Cases

Are you facing a real estate dispute over property ownership or division? Navigating real estate disputes can be challenging. This is especially true when co-owned properties are involved. If you're in such a situation, understanding the role of a partition lawyer is essential. These legal professionals are well-equipped to handle partition actions. In this article, we will look at how a partition lawyer helps with partition case resolution. Read on to ensure a fair division of co-owned property and protect legal rights.

Detect malicious activity in Google Workspace apps with Datadog Cloud SIEM

Google Workspace is a popular productivity suite, and its broad collection of apps (such as Gmail, Drive, Calendar, and Docs) can give attackers a central point of entry for accessing sensitive and valuable data if they compromise an account. Learning how to identify malicious activity in your Workspace environment enables you to stop threats before they become more serious. In this post, we’ll look at a few ways attackers gain access to and take advantage of Google Workspace.

Policy as Code: The Future of Authorization & Access Control - Sasha Klizhentas at Teleport Connect

Join Sasha Klizhentas, CTO of Teleport, as he discusses the critical challenges in authorization and access control, and introduces an innovative approach using policy as code. Learn how this new methodology can help prevent misconfigurations that lead to data breaches, and see a live demo of Teleport's new policy as code features with Dave Sudia. In this talk, you'll discover.

Enhancing Your Teleport Experience with Kenneth Roraback

Join a dynamic workshop session from Teleport Connect where users and team members collaborate to shape the future of Teleport. This interactive session captures real user feedback about current frustrations and desired features for 2025 and beyond, using a structured brainstorming approach with color-coded post-its and group discussions. In this session, you'll see: Key themes that emerged: Chapters.

All I Want For The Holidays Is.... Powerpwn

In the ever-evolving landscape of cybersecurity, the use of open-source red teaming tools has become indispensable. These tools not only raise awareness about potential vulnerabilities but also encourage security teams to think like attackers so they can begin the process of protecting their organizations against them. By simulating real-world attack scenarios, organizations can better understand their security posture and proactively address weaknesses.

Seasonal Phishing Scams: Protect Your Enterprise During the Holiday Spike

The holidays are a hectic time. It’s often the busiest sales period of the year, generating the lion’s share of revenue for many organizations. At the same time, employees are wrapping up their big projects before the office closes for the winter break. Meanwhile, everyone’s trying to work around increasingly packed schedules while caring for their personal and family needs.