Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud Security Automation with Torq + Sweet Security

For security teams, resolving a cloud incident takes an average of 10 days — time attackers can exploit to cause further damage. The problem? SOCs often lack the context and cloud security automation they need to respond faster. That’s where the partnership between Torq and Sweet Security changes the game.

Unified AI in XDR: A Single Source of Cyber Truth Date

WatchGuard Senior Product Marketing Manager Stephen Helm discusses how XDR can harness AI across your entire IT environment – correlating data from networks, Cloud services, VPN logs, and more into a single, AI-driven security framework. Cyber threats are evolving fast, and your clients rely on you to stay ahead.

No hallucinations here: track the latest AI trends with expanded insights on Cloudflare Radar

During 2024’s Birthday Week, we launched an AI bot & crawler traffic graph on Cloudflare Radar that provides visibility into which bots and crawlers are the most aggressive and have the highest volume of requests, which crawl on a regular basis, and more. Today, we are launching a new dedicated “AI Insights” page on Cloudflare Radar that incorporates this graph and builds on it with additional metrics that you can use to understand AI-related trends from multiple perspectives.

Stay Ahead of Cyber Threats: Cyber Awareness Week 2025

Cyber Awareness/Data Privacy Week 2025 has once again come and gone, and provides a stark reminder to take a closer look at your organization’s approach to cybersecurity. This annual event is not only a call to action for IT professionals but also a critical learning opportunity for everyday office workers. With cyber threats evolving daily, safeguarding your organization’s data is everyone’s collective responsibility.

DeepSeek Just Shook Up AI. Here's How to Rethink Your Strategy.

The rapid rise of generative AI (genAI) applications is reshaping enterprise technology strategies, pushing security leaders to reevaluate risk, compliance, and data governance policies. The latest surge in DeepSeek usage is a wake-up call for CISOs, illustrating how quickly new genAI tools can infiltrate the enterprise. In only 48 hours, Netskope Threat Labs observed a staggering 1,052% increase in DeepSeek usage across our customer base.

8 Cloud Data Backup Best Practices To Protect Business Data

Unfortunately, storing, saving, and backing up our files is not a 100% guarantee that our files will remain secure forever. We may accidentally delete our accounts, forget passwords to old backups, or worse, experience data loss due to corruption, hardware failure, or cyberattacks. It’s not just our personal files that we must keep in mind.

What is Berachain and Proof of Liquidity?

Berachain is a novel blockchain created to solve consensus mechanism incentive misalignment. For traditional Proof of Stake (PoS) blockchains, users have to lock their assets in order to participate in the security model and earn staking rewards. This results in incentive misalignment as the projects building on these blockchains want activity and volumes – this competes with the native security mechanism of staking which requires assets to be locked up.

Caught in the Act: CrowdStrike's New ML-Powered LDAP Reconnaissance Detections

Early in the cyberattack kill chain, reconnaissance enables attackers to assemble critical network information to plan a tailored attack strategy. In this phase, adversaries aim to map out networks and their users, and locate system vulnerabilities, without setting off alarms. Proactive monitoring and early detection of this activity can disrupt attackers in their tracks and lower the risk of a breach.