Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Recap: Experience Frictionless Access Without Sacrificing Security

“We need to get stuff done – but I’m not supposed to let you.” Shipping high priority code, meeting tight release deadlines, fighting incident fires —there are countless reasons why today's engineering teams need to move at lightspeed. This need for speed may put them at odds with security objectives.

Generative AI: Essential Insights for CISOs on Security Impacts

Generative AI (GenAI) is transforming the cybersecurity landscape, requiring Chief Information Security Officers (CISOs) and their teams to adapt quickly to both opportunities and challenges, according to the Gartner report 4 Ways Generative AI Will Impact CISOs and Their Teams. As organizations integrate GenAI into business processes, it is critical to secure not only the technology’s development but also its consumption across the enterprise.

Deliver Secure, Performant & Resilient Digital Citizen Services

Join Government Technology and Cloudflare for a live webinar where a panel of experts will explore how public sector agencies can leverage a platform-based approach to seamlessly navigate the shift to digital services—without compromising on efficiency, security, or simplicity.

Federal Zero Trust Maturity: From Backburner to Afterburner

Three years ago, the Federal Zero Trust Strategy promised that the government would learn and adjust as new technologies and practices emerge. That time is now. Let’s explore key innovations that advance Zero Trust maturity when your industry partner uses a federal-first approach. Watch this video to learn more.

Optimize Wordpress performance with Cloudflare's Automatic Platform Optimization

Does your WordPress site load too slowly? Cloudflare’s Automatic Platform Optimization (APO) plugin caches and serves your site from a global network, making site loads up to 72% faster! APO allows Cloudflare to serve your entire WordPress site on its global edge network, and would take HTML and CSS that would not typically be cached on the CDN to be done so automatically.

When change forces your hand: Finding solid ground after Skybox

Hey folks, let's be real. Change in the tech world can be a real pain. Especially when it's not on your terms. We've all heard the news about Skybox closing its doors, and if you're like a lot of us, you're probably feeling a mix of frustration and "what now?" It's tough when a private equity decision, like the one impacting Skybox, shakes up your network security strategy. You've invested time and resources in your Skybox implementation, and now you're looking at a forced switch.

Automation: Reducing Burnout, Improving Morale, and Mitigating Risk

Automation has the capacity to transform the way IT teams operate, from automated threat hunting to automated patching. However, not all organisations are making the most of its capabilities. In fact, many IT teams are suffering from ineffective automation strategies.

API Risks & Threats: What Wallarm's Reports Reveal #APIThreats #CyberResearch #APIExploitation

Wallarm conducts quarterly and annual API threat reports to provide data-driven insights on API vulnerabilities, risks, and attacks. This research helps the industry understand emerging threats and improve API security strategies. Stay informed with the latest findings!

FERC and NERC: Cyber Security Monitoring for The Energy Sector

As cyber threats targeting critical infrastructure continue to evolve, the energy sector remains a prime target for malicious actors. Protecting the electric grid requires a strong regulatory framework and robust cybersecurity monitoring practices. In the United States, the Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) play key roles in safeguarding the power system against cyber risks.

Securing Datadog's cloud infrastructure: Our playbook and methodology

At Datadog, we build and operate a complex, self-managed infrastructure that spans multiple cloud providers and serves many customers in regulated environments. We need to secure this large, distributed infrastructure while maintaining strict uptime requirements and scaling our finite people resources. In this post, I’ll detail the playbook that we use on Datadog’s Cloud Security team for securing our infrastructure, including.