Blog
Tech Blog
Amazon GuardDuty introduces new machine learning capabilities to more accurately detect potentially malicious access to data stored in S3 buckets
Amazon GuardDuty has incorporated new machine learning techniques that are highly effective at detecting anomalous access to data stored in Amazon Simple Storage Service (Amazon S3) buckets. This new capability continuously models S3 data plane API invocations...
Introducing Cloudforce One: our new threat operations and research team
Meet our new threat operations and research team: Cloudforce One. While this team will publish research, that’s not its reason for being. Its primary objective: track and disrupt threat actors. The security teams we speak with tell us the same thing: they’re...
How to augment or replace your VPN with Cloudflare
Almost everyone we speak to these days understands and agrees with this fundamental principle of Zero Trust. So what’s stopping folks? The biggest gripe we hear: they simply aren’t sure where to start. Security tools and network infrastructure have often been in...
Nvidia CEO: Hack was a ‘wake-up call’
A day after Microsoft (MSFT) confirmed it was hacked by the cybercrime group Lapsus$, Nvidia (NVDA) CEO Jensen Huang called his own company’s experience with the hackers a “wake-up call.” In an interview during Nvidia’s GTC Conference, which runs from March 21 to...
Four Ways to Assess Your Zero Trust Security Posture
With just about everything delivered from the cloud these days, employees can now collaborate and access what they need from anywhere and on any device. While this newfound flexibility has changed the way we think about productivity, it has also created new...
Will Zero Trust Shape the Future of Cloud Security?
Zero trust is everywhere, and it will change the way we undertake security. Just as zero trust concepts are shaping the data center and our networks, they will shape cloud environments, as well. Many of the challenges of cloud security arose because we moved workloads...