Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The hidden cost of compliance theater: what your audit score doesn't tell the board

A strong audit score can feel like a victory. It looks neat, reassuring, and board-friendly. But a high score can also hide the most important question of all: whether the business is actually safer, more resilient, and better prepared when something goes wrong. That gap is where compliance theater lives. It is a polished performance of compliance, but it lacks the underlying strength.

Tines achieves the ISO trifecta; ISO 27001, ISO 27701, and ISO 42001 certification

Today, we’re proud to share that Tines has achieved ISO 27001, ISO 27701, and ISO 42001 certification. This marks an important milestone in how we continue to effectively manage information security, privacy, and AI governance across our business and platform. For you, this is about more than achieving the ISO trifecta.

11:11 Systems Named an Aspiring Vendor in 2025 Gartner Peer Insights Voice of the Customer for DRaaS Report

At 11:11 Systems, we’ve always believed that disaster recovery is about much more than the underlying technology. It’s about cyber resilience, business continuity, and exceptional customer outcomes. Recently, 11:11 Systems was named an Aspiring Vendor in the 2025 Gartner Peer Insights Voice of the Customer for Disaster Recovery as a Service (DRaaS) report. This marks the third year 11:11 has received this recognition.

Understanding Cloudflare's network architecture

For decades, enterprise IT relied on a “hub and spoke” security model. But between the explosion of cloud infrastructure, SaaS apps and a remote workforce, that old perimeter hasn't just cracked—it’s shattered. In an attempt to stay on top of the advancing perimeter, many different solutions from many vendors entered the market and created a "spaghetti mess" of point solutions that drive up costs and tank user experience. Cloudflare is an answer to this problem, delivering everything you need to secure your apps, networks, users, data and devices.

"It's Quite a Shock": The Quantum Deadline Is Real

In this World Quantum Day special edition of This Week in NET, host João Tomé is joined by Bas Westerbaan (Principal Research Engineer) and Sharon Goldberg (Senior Director, Product) to explain why the timeline for post-quantum cryptography may be arriving sooner than expected. Recent research suggests the number of qubits required to break today’s encryption could fall dramatically, accelerating the urgency for companies and the Internet ecosystem to migrate to post-quantum security. Google has set a 2029 migration target, and Cloudflare is working toward a similar timeline.

A Look At GitGuardian's ML-Powered Contextual EnrichmentAnd Incident Scoring

In this quick introductory video, Mathieu Bellon, Senior Product Manager at GitGuardian, sits down with Dwayne McDaniel, Developer Advocate, to cover some of the advancements GitGuardian has made by integrating machine learning directly into the secrets security platform. Mathieu describes how engineers and responders can save serious time as by automating contextual analysis, geving the humans in the loop with the best information to be able to take an informed action when it comes to secrets leaks. They also discuss the security implications and where teams can look if they want to opt out or bring their own agents.

Observability and Security for the AI Era

Datadog has always been driven by a broader vision of helping teams understand and operate complex systems. In this session, you’ll hear from Yanbing Li, Chief Product Officer, and Shri Subramanian, Group Product Manager, as they share the latest updates across the Datadog product suite and discuss how that vision continues to shape the platform’s evolution and support the next generation of AI-driven applications.

Detecting Adversary Intent: Analyzing Behavioral Tells in Admin Logs with Allison Wikoff

Adversaries are already logging into your network using your own admin credentials. In this episode, Caleb Tolin sits down with Allison Wikoff to move past the identity clichés and analyze the specific behavioral signals that separate routine IT maintenance from state-sponsored sabotage. They dissect why resilience is not a flash of genius during a crisis, but a mindset that organizations can adopt to stay ahead of dynamic threat actors.