Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Set Up Astra Traffic Collector in a Linux VM | Complete Installation & Troubleshooting Guide

This tutorial provides a complete guide to deploying Astra Traffic Collector inside a Linux-based VM across cloud platforms like AWS, GCP, Azure, or DigitalOcean. It includes all necessary installation steps and configuration best practices for traffic monitoring in VM environments. In this video, we cover: This guide is designed for DevOps, security engineers, or platform teams looking to integrate deep traffic visibility into their environments with minimal overhead.

How to Set Up AWS Traffic Mirroring for Astra API Monitoring | Full Step-by-Step Guide

This tutorial provides a complete walkthrough for setting up AWS VPC Traffic Mirroring to enable packet-level monitoring with Astra’s API Security platform. You'll learn how to configure a scalable and production-ready environment using Network Load Balancers, Nitro-based EC2 instances, and properly filtered traffic sessions. The guide includes: It also covers key assumptions, unsupported configurations (like classic/Xen instances), and best practices for a secure and efficient deployment.

Cloud your way: Expanding threat visibility to meet the unique needs of your business

Let’s face it: The cloud has become the go-to platform for modern infrastructure—and for good reason. Scalability, flexibility, and speed are hard to beat. But as organizations increasingly rely on the cloud to run their critical operations, the threat landscape is evolving just as fast. And attackers? They’re getting smarter, stealthier, and more cloud-savvy by the day. That’s why monitoring cloud network traffic is no longer optional—it’s essential.

Unlocking New Jailbreaks with AI Explainability

In this post, we introduce our “Adversarial AI Explainability” research, a term we use to describe the intersection of AI explainability and adversarial attacks on Large Language Models (LLMs). Much like using an MRI to understand how a human brain might be fooled, we aim to decipher how LLMs can be manipulated.

A Complete Guide to Fintech Cloud Security

With the pace of growth in financial services accelerating, fintech is, in real terms, the new normal, not the new disruptor. Cloud technology has fueled this revolution, equipping companies with tools that can be scaled quickly in response to customer demands and market needs, and enabling cost savings that can be passed on to these customers.

Why is Fintech API Security Important in 2025

APIs (Application Programming Interfaces) are the invisible backbone of everything from mobile banking to cryptocurrency exchanges. These powerful interfaces enable transactions to become frictionless, allowing data to be shared in real-time and services to be integrated in new ways across platforms, thereby transforming the way financial services operate and delivering customer value. But that very interconnectedness that drives innovation also creates new points of risk.

Connect, protect and build digital environments with real business results

Don’t let network complexity hold back your app modernization, AI adoption, and other digital projects. Cloudflare’s connectivity cloud is a unified platform that enhances how you connect, protect and build your digital environment. See how you can get secure, low-latency, and infinitely scalable connectivity across networks, applications, and users.