Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Security for Apps is now generally available

Cloudflare’s AI Security for Apps detects and mitigates threats to AI-powered applications. Today, we're announcing that it is generally available. We’re shipping with new capabilities like detection for custom topics, and we're making AI endpoint discovery free for every Cloudflare customer—including those on Free, Pro, and Business plans—to give everyone visibility into where AI is deployed across their Internet-facing apps.

How the Shared Responsibility Model Gap Makes You Lose Money

SaaS uptime doesn’t guarantee you can recover fast or restore the collaboration context you need. The Shared Responsibility model/Limited Liability model gap shows up as money lost through rework, downtime, compliance drag, and trust friction. It’s usually driven by short retention, missing metadata after exports or migrations, untested restores and recovery copies that are not separated from production admins.

Ep. 49 - Iran's AI-Powered Cyber Warfare: The Next Phase of the Global Cyber Threat

Iranian cyber operations are entering a new era. In this final episode of our Iran cyber series, we explore how Iranian APT groups are evolving — leveraging AI, targeting supply chains, and bypassing the billion-dollar security stacks built to stop them. Hosts Tova Dvorin and Adrian Culley break down the emerging threats shaping 2026, including: The perimeter is gone. Your weakest vendor may now be your biggest risk.

The Vendor Tiering Series: Tiering that Scales

There’s no way to stop the clock in cybersecurity for InfoSec teams, but you can find ways to manufacture a better way to spend their time. Tiering does just that, prioritizing your team’s most finite resource. But to start, you need better data, and most importantly, better logic to redefine how you work.

Log Correlation for Security and Performance Monitoring

International travel comes with amazing sights, cultural experiences, and local delicacies. However, most travelers know that it comes with differing economies that impact a money’s value and various currencies. When people need cash, they have to translate the money in their wallets to the local currency, which means different coins and bills. Depending on the exchange rate, the currency’s value can change as the person moves from one country to another.

Highlights from the 2026 Cato CTRL Threat Report

Today, we published the 2026 Cato CTRL Threat Report, which is the second annual threat report on AI security from Cato CTRL (the Cato Networks threat intelligence team). In 2025, Cato CTRL uncovered a decisive shift in the AI threat landscape. Threat actors are no longer just exploiting AI systems. They are exploiting AI trust, workflows, and capabilities themselves.