Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When AI Agents and Automated Workflows Can Finally Be Trusted: How Tanium AEM for ServiceNow Transforms the Enterprise

In every corner of today’s enterprise, teams are under pressure to do more—faster. IT must deliver exceptional service, Security must contain threats in real time, and Risk teams must keep up with a constantly shifting regulatory landscape. These responsibilities are only growing, while the complexity and sprawl of endpoints, tools, and data sources continue to challenge even the most mature organizations.

Understanding AI governance: Why most organizations feel overwhelmed by regulations

As AI adoption accelerates across industries, the pressure to ensure responsible and compliant use is growing just as fast. Conversations around AI governance, once niche, are now central to boardroom strategy, legal risk assessments, and day-to-day operations. ‍ While organizations widely acknowledge the need for clear oversight, many of them are struggling to keep up. In our latest survey of industry leaders, half of the respondents said they feel overwhelmed by AI regulations.

The CISO's API Security Paradox: High Priority, Huge Blind Spots

In today’s digital-first world, APIs serve as the core infrastructure of modern business. They power mobile applications, facilitate critical cloud integrations, and support digital transformation initiatives. It's therefore understandable that 73% of CISOs consider API security a top or critical concern. However, a recent survey of 300 security leaders uncovers a troubling paradox: a large gap between awareness and action.

Securing Public Institutions with Cloudflare One

Florida’s colleges, universities, and public agencies are under pressure to manage growing cyber threats while supporting hybrid access and stretched resources. Join Tom Coffey, Senior SASE Specialist at Cloudflare, to learn how organizations like yours are adopting Zero Trust and SASE with Cloudflare One to simplify security, reduce costs, and improve performance.

What is Cloud Access Security Broker (CASB)?

Cloud apps make work easier, but they also open the door to new security risks. This blog unpacks everything you need to know, like: what is CASB in cyber security, how it works, and why it matters. We break down the core pillars of CASB, share real-world use cases, and help you understand the benefits it brings to your business.

How to Build a Security Team That Actually Enables the Business with Olivier Busolini

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by Olivier Busolini, Group Head of Information Security at Mashreq, to explore how cybersecurity leadership has transformed from a purely technical function to a strategic business partnership.

Rewind: Microsoft Kernel Shift, GPT-4o Threats, and Scattered Spider - The 443 Podcast - Episode 334

First, we look back at Microsoft’s major shift to remove endpoint protection from the Windows kernel. When we first covered it, it was a proposed change—now it's happening, and the implications are big. Next, we revisit a segment on GPT-4o and how generative AI is fueling the next wave of social engineering attacks. It's smarter, faster, and more convincing than ever. And finally, a refresher on the arrest of a Scattered Spider leader. While that made headlines, the group's activity hasn’t slowed down, they're still very much on the radar, as we discussed just last week.

Beyond the Hype: Why Adaptive AI is Essential for Modern SOCs

Artificial Intelligence (AI) has revolutionized Security Operations Centers (SOCs), automating threat triage and response. But not every AI is equipped to handle today’s evolving cyber threats. Many SOC platforms still rely on static, pre-trained models designed for yesterday’s attack patterns, leaving modern organizations vulnerable.

Introducing simple and secure egress policies by hostname in Cloudflare's SASE platform

Cloudflare’s SASE platform is on a mission to strengthen our platform-wide support for hostname- and domain-based policies. This mission is being driven by enthusiastic demands from our customers, and boosted along the way by several interesting engineering challenges. Today, we’re taking a deep dive into the first milestone of this mission, which we recently released in open beta: egress policies by hostname, domain, content category, and application. Let’s dive right in!