Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloudflare acquires BastionZero to extend Zero Trust access to IT infrastructure

We’re excited to announce that BastionZero, a Zero Trust infrastructure access platform, has joined Cloudflare. This acquisition extends our Zero Trust Network Access (ZTNA) flows with native access management for infrastructure like servers, Kubernetes clusters, and databases.

Rakuten Drive: Secure, but Private File Transfer and Cloud Storage?

Are you looking to try a new service to transfer large files of up to 50GB? Then there’s a new player in the file-sharing market that may interest you — Rakuten Drive. In February 2024, Rakuten announced the commercial launch of Rakuten Drive, a file storage cloud service based in Japan. Rakuten Drive allows individuals and enterprises to send large files with customized access controls, store, and edit Microsoft documents.

Maximizing Security: A Complete Guide to IAM Zero Trust Principles

In a security landscape that no longer tolerates assumptions of trust, IAM Zero Trust offers a stringent approach to protect your network. Discover how to apply ‘never trust, always verify’ effectively in our comprehensive look at IAM Zero Trust principles.

Mastering Identity and Access Management Policies: A Comprehensive Guide

How can your business develop and maintain identity and access management policies that safeguard your digital assets while providing appropriate access levels? In this guide, we explore the key elements of IAM policies, their critical role in organisational security, and offer actionable insights for crafting policies that align with both business needs and regulatory demands.

Advanced Threat Protection for Apps Built Using AI

AI has undoubtedly revolutionized various industries, enhancing both efficiency and innovation through low-code and no-code platforms. Yet, this ease of development brings with it an increased burden of security. As business users and developers rapidly build applications, automations, and bots using AI, the complexity and volume of these creations amplify potential security vulnerabilities.

How Are SMEs Approaching AI?

Have you heard about AI yet? Just kidding. We know you have. Recently, AI’s popularity has skyrocketed among businesses and consumers alike. This surge was driven by a combination of technological advancements (e.g., machine learning, natural language processing, and data analytics) with an increase in tool accessibility and user-friendliness.

JumpCloud and Google: Even Better Together

It’s been just over a year since JumpCloud and Google announced a strategic partnership to seamlessly manage your Google Workspace identities, the access they need, from any device leveraging one platform. You may be wondering what’s new, how it’s going for our customers and partners, and what benefits they’re getting from the joint solution? This article provides a condensed set of resources that make it simpler to get started with a demo or simulations.

Simplify SOC analyst experience with the enhanced Corelight Splunk App

Security operations centers (SOCs) play a vital role in detection, containment and mitigation of today’s advanced cyber attacks. SoC teams are also responsible for proactively hunting for threats, and improving the organization’s overall security posture. Modern SOC analysts struggle with alert fatigue.

Opti9's AWS Disaster Recovery: Your Path to Unmatched Cloud Resilience

Businesses today rely heavily on the cloud infrastructure provided by Amazon Web Services (AWS) to drive innovation, enhance scalability, and streamline operations. However, with this reliance comes the imperative need to safeguard against potential disruptions that compromise business continuity and an organization’s reputation. This is where Disaster Recovery (DR) steps in as a critical component of any organization’s AWS strategy.