Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Survey: Enterprises Seek New Load Balancing Vendors as Issues Mount

A cloud transformation is no time to discover shortcomings in your load balancing solution—or the vendor who provides it. But according to a recent series of industry surveys, that’s exactly the situation currently facing many enterprises. With hybrid environments now the norm, and cloud-first strategies on the agenda, both load balancer/ADC functionality and vendor relationships are leaving IT leaders unsatisfied. And that’s enough to make them consider other options.

Cloudflare's commitment to advancing Public Sector security worldwide by pursuing FedRAMP High, IRAP, and ENS

Today, we announced our commitment to achieving the US Federal Risk and Authorization Management Program (FedRAMP) - High, Australian Infosec Registered Assessors Program (IRAP), and Spain’s Esquema Nacional de Seguridad (ENS) as part of Cloudflare for Government. As more and more essential services are being shifted to the Internet, ensuring that governments and regulated industries have industry standard tools is critical for ensuring their uptime, reliability and performance.

Penetration Testing ROI: How to Convince Leadership to Invest in Cybersecurity

While Chief Information Security Officers (CISOs) know how crucial a consistent enterprise penetration testing program is to their cybersecurity program, convincing their fellow leaders and board members to invest in pen testing amid other budget demands can be challenging. The key is to speak to these leaders in terms they readily understand, focusing largely on risk.

CISO Liability: Why Managing Breaches Matters More Than Stopping Them

How can CISOs protect themselves from liability? Today’s security leaders must focus on breach response, not just prevention. This clip explores why CISOs are increasingly being held accountable for cyber incidents and how to shift towards strategic risk management.

The Cost of Being a CISO Part 2: Ethics, Leadership and Strategic Impact

Welcome back to Razorwire! I'm your host, Jim, and in this second part of our CISO Dilemmas series, we welcome back security experts Oliver Rochford and Richard Cassidy. Moving beyond the challenges covered in part one, this episode explores the rewarding aspects of the role while taking a frank look at the ethical issues security leaders regularly face. The guests share personal experiences and practical actions for transitioning from technical expertise to strategic leadership, building effective teams and managing relationships across the business.

Demo: Tanium Autonomous Endpoint Management (AEM) in action

This end-to-end demo of Tanium AEM will guide you through the foundational automated capabilities of the Tanium platform. Tanium AEM leverages real-time insights from all Tanium cloud-managed endpoints to recommend and automate changes on endpoints within a customer’s environment in a safe, scalable way with its real-time platform. It empowers IT and Security teams to confidently and efficiently scale operations and improve the security posture of the environment.

What Is CTEM? Understanding Gartner's CTEM Framework

In the world of cybersecurity, nothing stays still for long. The endless proliferation of new technologies and rapidly shifting threat landscapes forces organizations to continually reevaluate their approach to risk. Over the last two decades, security teams have leaned heavily on vulnerability management (VM) solutions to identify, classify, and patch software vulnerabilities on internal assets.

Simplify your SIEM migration to Microsoft Sentinel with Datadog Observability Pipelines

As cyberattacks rise in number and sophistication, many CISOs are pushing their organizations to adopt modern SIEM solutions to better monitor and investigate threats to their applications and infrastructure. Enterprises with a large Microsoft Azure or Windows-based footprint in particular are increasingly eyeing Microsoft Sentinel to consolidate their security stack and workflows.