Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Integrate CloudCasa with Spectro Cloud Palette for Kubernetes Backup, DR & Migration

In this technical demo, Martin Phan, Field CTO at CloudCasa, walks you through how to integrate CloudCasa, a powerful Kubernetes backup and disaster recovery solution, with Spectro Cloud Palette. Learn how to streamline your backup, disaster recovery, and migration workflows for Kubernetes clusters. What You’ll Learn: Whether you're managing Kubernetes clusters on Azure or any hybrid setup, this video will help you enhance your Kubernetes data protection strategy using Spectro Cloud + CloudCasa.

7 Key Features to Look For in a PAM Solution

With credentials now being one of the most exploited vectors in cyberattacks, we must go beyond basic access controls and ensure every privileged session is secure, auditable, and justified. That’s why choosing a robust privileged access management (PAM) solution is a must. This post will walk you through the seven best features in PAM solutions that can effectively protect your infrastructure.

Hijacked by a Text: Understanding and Preventing SIM Swapping Attacks

SIM swapping is not a novel cyber threat; it has been a persistent issue for over a decade. This technique exploits vulnerabilities in mobile carrier procedures and identity verification protocols. Attackers employ social engineering tactics to deceive telecom providers into transferring a victim’s phone number to a SIM card under their control.

Data driven detection: Corelight's approach to AI-powered NDR

The Gordian knot of any detection strategy is knowing that two conflicting ideas are both true. On one hand, every SOC needs as much accurate detection coverage as they can get to find and disrupt attacks. On the other, the attackers you REALLY care about will find a way to bypass those detections so you need the ground truth of the attacker behavior on your network. The only answer is to have both: the absolute best data and the broadest detection suite possible on top of it.

Onboarding DNS with Cloudflare

A step-by-step walkthrough on how to onboard your DNS to Cloudflare. Learn how to seamlessly migrate, optimize performance and enhance security using Cloudflare’s powerful DNS features. Our expert will guide you through best practices, common pitfalls and advanced configurations to ensure a smooth transition. Whether you're new to Cloudflare or looking to refine your setup, this session will equip you with the knowledge to maximize reliability and speed.

"You can't have privacy without cybersecurity" - Building with Certifications in Mind

In this clip from This Week in NET, Emily Hancock, Chief Privacy Officer, and Rory Malone, Principal Privacy Compliance Specialist at Cloudflare, explain the deep connection between privacy and cybersecurity — and why certifications matter more than ever. They discuss Cloudflare’s approach to building with certifications in mind, including recent global data transfer certifications like CBPR and PRP. It’s all part of Cloudflare’s “show, don’t just say” philosophy: strong protections, audited controls, and real trust.

Ransomware Strikes! What to Do in the First 60 Minutes: Understanding the Threat (Part 2)

Are you prepared for a ransomware attack? In this 2nd part of our "Ransomware Strikes! What to Do in the First 60 Minutes" series, we move forward on one of the most terrifying cyber threats facing businesses today. Join VISTA InfoSec, an officially empaneled organization with CREST, PCI Council, CSRO SG, SWIFT, and CERT-IN, as we dive deep into the reality of ransomware in 2024. We'll reveal staggering statistics and solutions that you ought to execute to escape the mess.

What Is A Qualified Electronic Signature and When Do You Need It?

The European Union has many laws and requirements to protect our data online, the most well-recognised being the GDPR. Aside from that, the EU also has regulations to make signing and verifying sensitive documents easily and securely online by using a qualified electronic signature. These kinds of signatures are quickly replacing traditional document signing, which is time-consuming and has a higher risk of fraud or document tampering.