Perimeter-based security is no longer sufficient, security surfaces and compute demands are...
Palo Alto Network’s product announcement coincided with its quarterly earnings report, which fell...
Hacking isn’t new. If you follow the 2600 Magazine culture of know the name Mitnick or Draper you know that hacking has been a part of systems as long as their have been systems. What has changed in recent years is the malicious aspect of what’s going on in the acts themselves. The pioneers of hacking culture were focused on short term gains or personal exploitation. It was more about proving you could break into a system and getting the side benefit of free phone calls or an untraceable mobile device. Today’s hacking cultures are driven by massive amounts of theft and exploitation of resources to a degree that would make any traditional hacker blush.
It’s much like the difference between petty street crime and “organized” crime. With a patron and a purpose, the organizers of the individual members can coordinate to accomplish a bigger goal than was ever thought possible by the person on the street. Just like a wolf pack or jackals, you can take down a much bigger target with come coordination. I talked a little bit about how the targets were going to start changing almost seven years ago and how we needed to start figuring Continue reading
Security is a serious business, one that we do not take lightly at Cloudflare. We have invested a lot of effort into ensuring that our services, both external and internal, are protected by meeting or exceeding industry best practices. Encryption is a huge part of our strategy as it is embedded in nearly every process we have. At Cloudflare, we encrypt data both in transit (on the network) and at rest (on the disk). Both practices address some of the most common vectors used to exfiltrate information and these measures serve to protect sensitive data from attackers but, what about data currently in use?
Can encryption or any technology eliminate all threats? No, but as Infrastructure Security, it’s our job to consider worst-case scenarios. For example, what if someone were to steal a server from one of our data centers? How can we leverage the most reliable, cutting edge, innovative technology to secure all data on that host if it were in the wrong hands? Would it be protected? And, in particular, what about the server’s RAM?
Data in random access memory (RAM) is usually stored in the clear. This can leave data vulnerable to software or hardware probing by Continue reading
Huawei security concerns ignited RSA panel discussion; Airline exec dished advice to security...
The expansion more than doubles the reach of the U.S.-based carrier's SD-WAN service compared to a...
“We see a tremendous opportunity to create a multi-billion-dollar security company,” Poonen...
“We need to combine AI with that human apathy,” she said during an RSA keynote. “We need both...
A discussion with panelists from the U.S. Department of Defense, Huawei, a conservative think tank,...
Informed consent of genetic data is critical, but people aren’t always clear about what they are...
Cisco SD-WAN targeted FedRAMP; Verizon warned of mobile security risks; and the Russians are coming...
Southwest Airlines’ Carrie Mills says CISOs want less agents, fewer point products, and more...
Once Russian state-sponsored groups compromise just one machine, they can move laterally to other...
The Workers team here at Cloudflare has been hard at work shipping a bunch of new features in the last year and we’ve seen some amazing things built with the tools we’ve provided. However, as my uncle once said, with great serverless platform growth comes great responsibility.
One of the ways we can help is by ensuring that deploying and maintaining your Workers scripts is a low risk endeavor. Rotating a set of API keys shouldn’t require risking downtime through code edits and redeployments and in some cases it may not make sense for the developer writing the script to know the actual API key value at all. To help tackle this problem, we’re releasing Secrets and Environment Variables to the Wrangler CLI and Workers Dashboard.
As we started to design support for secrets in Workers we had a sense that this was already a big concern for a lot of our users but we wanted to learn about all of the use cases to ensure we were building the right thing. We headed to the community forums, twitter, and the inbox of Louis Grace, business development representative extraordinaire, for some anecdotes about Secrets usage. We also sent Continue reading
One of the near-term goals is to make cryptography more robust and ready for a post-quantum...
McAfee plans to integrate Light Point Security’s browser isolation technology into its secure web...
Google showed love for Intel’s security transparency; VMware gained an extra boost with cloud...
“Part of the challenge that I have is taking all of these different technologies and tying them...
“When it comes to building an overall security stack, hardware and the firmware that runs on that...