Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The US Threat Landscape in 2023

The United States is at the epicenter of cyber crime globally. It is by far the most highly-targeted nation, and American businesses face a higher volume of attacks as well as more costly consequences when an attack is successful. In this webinar, Cyberint Threat Research Team Lead Shmuel Gihon will discuss the current US threat landscape, recent trends, and the most urgent risks to prepare for. Using research and data collected by the Cyberint research team.

SEC Regulations: What is a "Material" Cybersecurity Incident?

In one of the most important cybersecurity regulatory developments in recent memory, the U.S. Securities and Exchange Commission (SEC) recently adopted new cybersecurity disclosure requirements for publicly traded companies, including a requirement to publicly disclose a “material” cybersecurity incident in Form 8-K within four business days of determining that it is material.

Microsoft 365 GCC High Guide for DoD Contractors

In today’s rapidly evolving cyber threat landscape, organizations, particularly those within the public sector and defense industries, face unprecedented challenges in securing sensitive data and ensuring regulatory compliance. The need for a comprehensive, cloud-based productivity and collaboration suite that empowers teams and meets stringent security and compliance requirements has never been greater.

Unlocking the Power of Cybersecurity Automation: Insights from ThreatQuotient's 2023 Research

Defined by relentless cyber threats and evolving challenges, the role of cybersecurity has never been more crucial. As organizations across the globe struggle with the ever-expanding threat landscape, the adoption of cybersecurity automation has emerged as a promising solution. This third annual survey conducted by ThreatQuotient, explores cybersecurity automation adoption and provides insights gathered from 750 senior cybersecurity professionals from the UK, US, and Australia.

Announcing IaC+ early access: Secure your infrastructure configurations across the SDLC

Designing and maintaining secure infrastructure configurations from code to cloud is a complex process involving multiple technical teams and security stakeholders. The first challenge is writing secure infrastructure configurations pre-deployment.

Does AI lead to AppSec hell or nirvana?

The use of artificial intelligence in every area of life — from writing papers to maintaining critical infrastructure to manufacturing goods — is a controversial topic. Some are excited about the possibilities that come with AI/ML tech, while others are fearful and reticent. These differing opinions raise a fundamental question: will AI turn our modern-day society into a utopia or a dystopia?

James Rees on Self-Reflection and Burnout | Human Psychology

James Rees shares his personal experience with burnout, specifically during the early stages of running a business and facing the pressures of entrepreneurship, such as security incidents and team management. He describes a technique he uses where he steps back from his own emotional reactions to objectively analyze why he may be experiencing extreme anger, sleep problems, or overlooking simple things in his life. This method has proven effective in helping him understand and manage burnout.

Today's Top Cybersecurity Threats & the Impacts to Your Business

With the escalating frequency and complexity of cyberattacks, businesses are constantly under threat. Security operations have become an indispensable aspect of organizational survival and success. Cyberattacks and data breaches regularly make headlines as malicious actors continue to adapt and develop new tactics.

Announcing General Availability for the Magic WAN Connector: the easiest way to jumpstart SASE transformation for your network

Today, we’re announcing the general availability of the Magic WAN Connector, a key component of our SASE platform, Cloudflare One. Magic WAN Connector is the glue between your existing network hardware and Cloudflare’s network — it provides a super simplified software solution that comes pre-installed on Cloudflare-certified hardware, and is entirely managed from the Cloudflare One dashboard.

Strengthening Cybersecurity for small and medium-sized businesses: The importance of Security Orchestration, Automation, and Response (SOAR)

In today's increasingly complex threat landscape, small and medium-sized businesses (SMBs) face significant challenges in protecting their assets and reputation from cyber threats. We will explore the benefits of SOAR, its role in enhancing security operations, and its ability to mitigate risks, streamline incident response, and protect valuable business assets.