Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is a Cloud-Native Security Automation Framework? Benefits & Use Cases

We live in a world where infrastructures reside entirely in the cloud, threats evolve faster than ever, and attackers never sleep. Manual security processes simply can’t keep pace. Cloud-native security automation is the critical solution for organizations to secure large attack surfaces.

What CISA's BOD 25-01 Means for API Security and How Wallarm Can Help

The US government has taken another significant step towards strengthening cloud security with the release of CISA’s Binding Operational Directive (BOD) 25-01. Aimed at improving the security posture of federal cloud environments, BOD 25-01 mandates robust configuration, visibility, and control across cloud-based services. While the directive doesn’t explicitly name API security, securing modern cloud systems relies on securing APIs - including the ones security teams don’t know about.

Empowering your LLMs: Unlocking cybersecurity queries with Open WebUI knowledge bases

In the rapidly evolving landscape of large language models (LLMs), the ability to access and synthesize vast amounts of information is paramount. While LLMs excel at generating creative text and understanding complex prompts, their knowledge is often limited to the data used during their training. This is where knowledge bases (a.k.a.

The quantum-AI collision: What CISOs must do now to stay ahead

Technology is moving at the speed of light, and two forces—quantum computing and AI agents—are poised to shake up cybersecurity. We’re not talking about some far-off future; this is happening now. The message for CISOs and security leaders is simple: If you’re not preparing now, you’re already behind. As we say in Brazil, “Melhor prevenir do que remediar” or “better to prevent than remediate.”

How Zenity Helps Enterprises Apply AI TRiSM to AI Agents

The future isn’t human vs machine, it’s human trying to govern machines. As AI agents grow more autonomous (like replying to emails, writing code, granting access, making decisions, etc.) the real threat isn’t a malicious model. It’s the absence of controls. AI Agents don’t come with built-in security policies. They don’t ask for permission. They simply do what they’re told (sometimes correctly, sometimes dangerously) because no guardrails told them otherwise.

Introducing the IONIX & Cloudflare Integration: Complete External Exposure Management and Protection

Today, we’re excited to announce a powerful new integration between IONIX and Cloudflare that enables organizations to comprehensively govern, manage and secure their entire external attack surface with confidence.

Introducing the Jit MCP Server: Security Context and Automation at Your Fingertips

Meshi Yona is the Software Development Team Lead at Jit, where she brings together a strong foundation in cyber systems, analytical thinking, and leadership. Today, we're thrilled to announce the launch of the Model Context Protocol (MCP) Server for Jit, now available in preview for our customers. MCP is an innovative new standard rapidly gaining traction across the AI ecosystem — designed to bridge the gap between applications and large language models (LLMs).

Onboarding DNS with Cloudflare

A step-by-step walkthrough on how to onboard your DNS to Cloudflare. Learn how to seamlessly migrate, optimize performance and enhance security using Cloudflare’s powerful DNS features. Our expert will guide you through best practices, common pitfalls and advanced configurations to ensure a smooth transition. Whether you're new to Cloudflare or looking to refine your setup, this session will equip you with the knowledge to maximize reliability and speed.

"You can't have privacy without cybersecurity" - Building with Certifications in Mind

In this clip from This Week in NET, Emily Hancock, Chief Privacy Officer, and Rory Malone, Principal Privacy Compliance Specialist at Cloudflare, explain the deep connection between privacy and cybersecurity — and why certifications matter more than ever. They discuss Cloudflare’s approach to building with certifications in mind, including recent global data transfer certifications like CBPR and PRP. It’s all part of Cloudflare’s “show, don’t just say” philosophy: strong protections, audited controls, and real trust.