Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Can End-to-End Encryption Be Hacked?

We have become so reliant on communicating on the Internet that sometimes we need to take a minute to consider how our data is being protected and whether what we send on the Internet is truly safe. While end-to-end encryption has become integral to protecting our data online, you may be thinking, can end-to-end encryption be hacked?

How Corelight's anomaly detection enhances network security

Signature-based detections provide fast, effective defense against known attacks. But the threat landscape is rapidly changing: Attackers are utilizing novel, sophisticated techniques that can bypass traditional, signature-based detection methods and also weaponizing legitimate tools and processes to avoid established detection tools, including endpoint detection. In this dynamic environment, organizations must in turn deploy new detection techniques to keep pace.

Enhanced Cloudflare Access: private hostnames, IP apps, and reusable policies

Welcome to Cloudflare Security Week 2025! During this year's Security Week, we are boosting security with AI-driven insights, better threat detection, and stronger protections against emerging risks. Our aim is to empower customers with more intuitive and user-friendly solutions to protect their data and applications in an increasingly complex environment. In this episode, tune in for a conversation with Cloudflare's Kenny Johnson, Principal Product Manager.

Managing sensitive data exposure in AWS and GCP using Cloudflare

Welcome to Cloudflare Security Week 2025! During this year's Security Week, we are boosting security with AI-driven insights, better threat detection, and stronger protections against emerging risks. Our aim is to empower customers with more intuitive and user-friendly solutions to protect their data and applications in an increasingly complex environment. In this episode, tune in for a conversation with Cloudflare's Alex Dunbrack, Senior Product Manager, and Noelle Kagan, Senior Manager, Product Management.

Introducing a new Application Security experience

Welcome to Cloudflare Security Week 2025! During this year's Security Week, we are boosting security with AI-driven insights, better threat detection, and stronger protections against emerging risks. Our aim is to empower customers with more intuitive and user-friendly solutions to protect their data and applications in an increasingly complex environment. In this episode, tune in for a conversation with Cloudflare's Jessica Tarasoff, Product Design Lead, and Pete Thomas, Senior Manager, Product Design.

Ofgem's Mollie Chard on driving resilience through diverse hiring practices

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Mollie Chard. Mollie’s career spans 10+ years in technical SOC and leadership roles at organizations like the UK’s Met Office, Capgemini, and OVO. She’s recently accepted a new role as Head of Cyber Guidance & Monitoring at Ofgem, the UK’s Office of Gas and Electricity Markets. A passionate advocate for diversity, she’s also the Chief Advisor for Women in Cybersecurity UK and Ireland.

Snyk Partners with Nova8 to Empower Secure Development Across Latin America

The Latin American technology landscape is growing rapidly, with organizations embracing digital transformation and cloud-native development. This growth brings incredible opportunities to this market – but can also introduce significant security challenges that can slow innovation if not addressed proactively.