Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GDPR and CPRA: A Unified Call for Data Transparency and Accountability

The General Data Protection Regulation (GDPR) of the European Union and the California Privacy Rights Act (CPRA) represent landmark regulations designed to protect consumer data privacy. While GDPR became enforceable in May 2018, CPRA came into effect in January 2023, building on its predecessor, the California Consumer Privacy Act (CCPA). Both laws aim to empower individuals with greater control over their personal data while imposing rigorous obligations on businesses.

Turn unstructured data into insights with Sumo Logic

Achieve maximum visibility into your structured and unstructured data with Sumo Logic’s AI-powered Log Analytics Platform. With schema on-demand, there’s no need to organize your data before uploading. Gain real-time insights, visualize patterns, and centralize your data into a single source of truth to power every step of your DevSecOps journey.

The Future (and Present) of the Internet, AI, and Tech with Nicholas Thompson

This week, host João Tomé is joined by Nicholas Thompson, CEO of The Atlantic and former editor-in-chief of Wired, during his participation at Web Summit, the international event held in Lisbon with over 70,000 attendees. In this conversation, Thompson discusses the Internet, AI, social media, and the challenge of protecting content creators from AI crawlers—a problem Cloudflare’s AI Audit is designed to address. We also explore the 2024 media landscape, its future, and its role in supporting democracy.

How Does Incognito Mode Work?

Incognito mode, also known as private browsing mode, stops your web browser from saving your browsing history on your device. By turning on incognito mode, you can browse the internet with the assurance that closing incognito mode will erase your cookies and data. Incognito mode also logs you out of your online accounts, which is useful if you’re sharing a device with others and want to maintain your privacy.

Privileged Access for Modern Infrastructure: The Top Four Challenges

As organizations have transitioned from legacy IT infrastructure to cloud-native, ephemeral modern infrastructure, the needs of how privileged access is handled have shifted, too. Modern infrastructure presents unique challenges that legacy Privileged Access Management (PAM) tools, originally architected for more static environments, weren’t designed to handle. In this post, we explore why characteristics of modern infrastructure require a modern approach to PAM.

CosmicSting: A Critical XXE Vulnerability in Adobe Commerce and Magento (CVE-2024-34102)

The e-commerce world was recently shaken by the discovery of a vulnerability in Adobe Commerce and Magento, two of the most widely used e-commerce platforms. Dubbed "CosmicSting" and designated as CVE-2024-34102, this vulnerability exposes millions of online stores to potential remote code execution and data exfiltration risks.

Bypassing the Bypass: Detecting Okta Classic Application Sign-On Policy Evasion

In September 27, 2024, Okta disclosed a critical vulnerability affecting their Classic environment that created a concerning security gap in identity protection. The vulnerability, active since July 17, 2024, allowed attackers with valid credentials to bypass application-specific sign-on policies by simply modifying their user-agent string.