Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Verifying Bots and Agents with Cryptography in the Age of AI

In this episode, host João Tomé is joined in Cloudflare’s Lisbon office by our Senior Research Engineer Thibault Meunier to explore a new proposal that could reshape how bots interact with the web in the age of AI. Timestamps: We go into Cloudflare’s proposal of using cryptographic signatures for bots, enabling websites to verify their identity. Why is this important? As AI systems rely increasingly on online content, this standard could help build a better relationship between content creators and AI platforms.

Poison everywhere: No output from your MCP server is safe

The Model Context Protocol (MCP) is an open standard and open-source project from Anthropic that makes it quick and easy for developers to add real-world functionality — like sending emails or querying APIs — directly into large language models (LLMs). Instead of just generating text, LLMs can now interact with tools and services in a seamless, developer-friendly way.

What is an API Specification?

API specifications are no longer just tools for developers; they are also essential for businesses. In today’s hyperconnected enterprise, they serve as strategic assets that define how digital ecosystems interact, share data, and enforce security protocols. Yet, most C-suite leaders underestimate their influence on risk posture, regulatory compliance, and operational resilience. That needs to change.

Network Solutions API

Network APIs have quietly evolved from backend enablers to frontline security and business risk vectors. While traditionally viewed as infrastructure tools, they significantly influence enterprise agility, availability, and threat surface. For CISOs and CFOs navigating the complexities of digital transformation and cyber risk governance, the security of these APIs is no longer optional—it is foundational.

Building a Secure Foundation: Compliance-Driven API Posture Governance

APIs are the vital connectors of modern digital business, powering everything from e-commerce and financial transactions to healthcare data exchange and government services. While indispensable for innovation, this widespread API adoption introduces significant security risks.

Cloudflare named a Strong Performer in Email Security by Forrester

Today, we are excited to announce that Forrester has recognized Cloudflare Email Security as a Strong Performer and among the top three providers in the ‘current offering’ category in “The Forrester Wave: Email, Messaging, And Collaboration Security Solutions, Q2 2025” report. Get a complimentary copy of the report here. According to Forrester.

Do we need an AI compliance framework?

Compliance isn’t just a checkbox. It’s the frontline of cybersecurity defense. In this episode of the Cybersecurity Defenders podcast, Joshua Hoffman, Chief Revenue Officer at ControlCase, shares critical insights on the evolving role of compliance in cybersecurity. From frameworks like CMMC and SOC 2 to the rising pressure from new SEC regulations, we examine how organizations can move beyond surface-level audits and adopt a scalable security posture.

Cloud Detections in an Age of Cloud Tools with Fred Wilmot

Fred Wilmot, CEO and Co-Founder of Detecteam, joined Defender Fridays to discuss the growing concerns surrounding identity management in cloud security, particularly with the rise of attacks on platforms like O365 and Azure. He emphasizes the importance of analyzing network traffic to understand identity behavior and the complexities introduced by encryption and third-party authentication. He also notes the ongoing evolution in cybersecurity practices and the potential benefits of standardization in logging and taxonomies.

CrowdStrike Named a Frost Radar Leader in Cloud and Application Runtime Security

CrowdStrike has been named an innovation and growth Leader in the inaugural 2025 Frost Radar: Cloud and Application Runtime Security (CARS), positioned highest on the Innovation Index among all vendors evaluated. This marks another milestone in our mission to stop breaches with the industry's most unified and comprehensive cloud runtime protection.

Comprehensive Guide to Implementing Asset Monitoring Solutions

Are you seeking support to avoid unexpected asset malfunctions? Companies utilize asset monitoring solutions to maintain equipment operations without disruptions while protecting against costly downtime periods and extending the life of important infrastructure. Here's the good news... These solutions implement more easily than anticipated but yield substantial advantages. Our guide demonstrates all necessary steps to establish an efficient asset monitoring system for your business.