Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloudflare Connect 2025 Highlights: Common, James Allworth, David Tuber & Kenton Varda

We cover Cloudflare’s partnership with Mastercard & Visa on AI agent commerce, highlights from rapper Common, and conversations with: Full interviews with each guest will be published in the coming weeks. Plus: next week’s Cloudflare blog series on Internet Measurement, Resilience, and Transparency — the foundations of a faster, safer, and more reliable web.

What You Need to Know about the Envoy Air Data Breach

Founded in 1998, under the name American Eagle Airlines, Envoy Air’s origins can be traced back to November 1, 1984, following the first American Eagle flight. As American Airlines’ largest subsidiary, it aims to be a world-leading airline. As part of this commitment, Envoy fosters inclusion and celebrates diversity. Despite this initiative to achieve success, the company suffered a data breach in October 2025 when unauthorized parties accessed parts of its network.

Data Sovereignty in the Age of AI: Why It Matters and How to Get It Right

Data sovereignty means that data is subject to the laws and governance of the country where it is stored or processed. In simpler terms, if your AI system stores user data in Germany, you’re bound by EU’s GDPR rules — even if your company operates from the U.S. As AI and large language models (LLMs) become central to business operations, data sovereignty is no longer just a compliance checkbox.

How SaaS companies can achieve ISO 27001 certification

There’s a growing sense of risk awareness in the SaaS space as companies face increasing scrutiny over information security. According to Vanta’s State of Trust report, nearly two-thirds of organizations report that their stakeholders expect proof of a robust security posture and alignment with popular cybersecurity standards. ‍ ISO 27001 is one of the most widely recognized frameworks for demonstrating a strong security posture.

Why Managed Detection and Response (MDR) Is Now Essential

Managed Detection and Response (MDR) is one of the fastest-growing areas in cybersecurity. The reason is simple: companies today simply cannot keep up with the overwhelming volume of cyber threats they face. In fact, Gartner estimates that 50 percent of organizations will be utilizing MDR services by 2025. So, what is driving this massive shift toward outsourcing core security functions?

Brute Force Attack Prevention: Why Rate Limiting Isn't Enough for ATO Defense

A brute force attack is a method cybercriminals use to guess login credentials through repeated attempts until one works. It’s a simple idea that’s evolved into one of the most persistent enablers of account takeover (ATO). According to the 2024 Verizon Data Breach Investigations Report, brute force and credential-stuffing techniques accounted for nearly 70% of all password-related breaches that year, underscoring how these attacks remain a dominant entry point for ATO.

Secrets, out: Why workload identity is essential for AI agent security

AI agents aren’t waiting in the wings anymore. They’re approving payments, spinning up cloud resources, and pulling sensitive data at machine speed. Blink, and a swarm of them has already acted a thousand times before anyone can check the logs. But with all that speed and capability comes risk. For many teams, it’s the authentication model—not the tech—that’s breaking.

AI Chatbots Aren't Taking Your Jobs: They're Your New Assistants

I have never been one to jump on most technology bandwagons early; I am very pragmatic about what technology can do rather than what it promises. This extends to generative AI. I was not the first to play with ChatGPT and Gemini when they came out in the early 2020s. Maybe it’s because I work in fields that use machine learning very effectively. Even though I was aware of the leap Google made in 2012, I wasn’t eager to dive into the new wave of AI when it first appeared.

Phishing Campaign Impersonates Google Careers Recruiters

A phishing campaign is impersonating Google Careers to target job seekers, according to researchers at Sublime Security. “The scam is simple,” the researchers write. “An adversary sends an ‘are you open to talk?’ message impersonating an outreach email from Google Careers. If the target clicks the link, they’re taken to a landing page designed to look like a Google Careers meeting scheduler. From there, they’re taken to the phishing page.