Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing REACT: Why We Built an Elite Incident Response Team

Cloudforce One’s mission is to help defend the Internet. In Q2’25 alone, Cloudflare stopped an average of 190 billion cyber threats every single day. But real-world customer experiences showed us that stopping attacks at the edge isn’t always enough. We saw ransomware disrupt financial operations, data breaches cripple real estate firms, and misconfigurations cause major data losses. In each case, the real damage occurred inside networks.

Identity automation in the age of agentic AI with Matthew Chiodi

Defender Fridays - Identity Automation in the Age of Agentic AI with Matthew Chiodi Join us for this session of Defender Fridays as we explore identity automation in the age of agentic AI with Matthew Chiodi, Chief Strategy Officer at Cerby. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

A CISO's Guide to API Security

APIs are powering digital transformation but also exposing organizations to new risks. Securing them requires collaboration between CISOs, CIOs, and the board. This webinar will demystify the evolving API threat landscape, outline governance strategies, and provide leaders with the tools to communicate API risk in business terms. Key Learnings: Why You Should Attend.

Give First: Shifting to an Abundance Mindset in IT with Venture Capital Legend Brad Feld

In this installment of Make Work Happen, we're joined by Brad Feld, partner at Foundry Group, to dive into the powerful "Give First" philosophy that has shaped the Boulder startup community for decades. Brad discusses his career, from starting his first company 40 years ago to co-founding Foundry Group and Techstars. We explore how core values, or cultural norms, like non-transactional, positive-sum, multi-turn relationships, can define the success of a business or a community.

A step-by-step guide to AI security assessments [With a template]

As artificial intelligence becomes deeply integrated into business operations, organizations have started feeling the pressure to keep up. According to Vanta’s 2025 survey, more than 50% of the organizations report being overwhelmed by the speed of AI adoption and growing compliance obligations. ‍ This issue is aggravated by the fact that AI tools evolve faster than governance policies can adapt, potentially leaving complex gaps for security teams to fill.

Anatomy of a Modern Threat: Deconstructing the Figma MCP Vulnerability

Threat researchers recently disclosed a severe vulnerability in a Figma Model Context Protocol (MCP) server, as reported by The Hacker News. While the specific patch is important, the discovery itself serves as a critical wake-up call for every organization rushing to adopt AI. This incident provides a blueprint for a new class of attacks that target the very infrastructure powering the AI Agent Economy. To understand the risk, we must first look at the mechanics of this emerging threat.

Regulatory Frameworks Affecting AI and Data Privacy Explained

AI is now embedded in everyday operations across support, finance, healthcare, and the public sector. As models touch more sensitive data, the legal landscape is moving just as quickly. The center of gravity has shifted from annual checklists to continuous compliance in production. This guide explains the regulatory frameworks affecting AI and data privacy in 2025, how they fit together, and how to turn their requirements into practical, repeatable controls your teams can run every day.