Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloudflare acquires Outerbase to expand database and agent developer experience capabilities

I’m thrilled to share that Cloudflare has acquired Outerbase. This is such an amazing opportunity for us, and I want to explain how we got here, what we’ve built so far, and why we are so excited about becoming part of the Cloudflare team.

How to Plan a Budget for Mobile App Marketing

Launching a mobile app is just the beginning - the real challenge lies in getting users to notice it. With millions of apps in stores, standing out demands a smart marketing strategy and, more importantly, a well-planned budget. Whether you're a startup or scaling your app to new markets, knowing how to allocate your resources can make or break your success.

How to Design a Pool for All Seasons with Pool Heating and Cooling Tips

Owning a pool is a dream for many, providing a refreshing escape during the summer months. But why limit your pool enjoyment to just a few months of the year? With the right design and equipment, your pool can become an all-season oasis. Whether you're seeking warmth during cooler months or relief from the summer heat, there are several strategies you can use to keep your pool at the perfect temperature all year round. Here's some designs for custom swimming pools for year-round enjoyment with pool heating and cooling tips.

What are API Security Scanners and How to Choose the Right One?

APIs are business-critical assets, yet organizations overlook proper API security, relying on outdated tools built for web applications instead of modern API-driven ecosystems. The problem isn’t just bad coding practices but also API visibility, authentication gaps, and unchecked business logic flaws. API security requires dedicated and specific testing that understands how APIs are attacked; traditional scanners fail to keep up with that.

Learn more about building with Cloudflare - with Craig Dennis

As part of our "This Week in NET" show/podcast, Craig Dennis, Developer Educator at Cloudflare, walks us through Workers — our developer platform — and some of the things both developers and non-developers can build with it. A few highlights ahead of Developer Week (April 7–11, 2025), where new features and tools — including AI and AI agents — will be announced.

Master SaaS Security: Unifying Visibility & Control with Cato CASB

Shadow IT. Data leaks. Compliance violations. If your users are accessing cloud apps from unmanaged devices or outside sanctioned workflows, would you even know? In this video, we introduce Cato CASB (Cloud Access Security Broker), a native capability of the Cato SASE Cloud platform. Watch how Cato CASB provides deep real-time visibility into SaaS usage—both sanctioned and unsanctioned—so security teams can detect risky behavior, enforce access policies, and prevent data loss.

Cloudflare's commitment to CISA Secure-By-Design pledge: delivering new kernels, faster

As cyber threats continue to exploit systemic vulnerabilities in widely used technologies, the United States Cybersecurity and Infrastructure Agency (CISA) produced best practices for the technology industry with their Secure-by-Design pledge. Cloudflare proudly signed this pledge on May 8, 2024, reinforcing our commitment to creating resilient systems where security is not just a feature, but a foundational principle.

Why CISOs Need to Be Talking About The AI Revolution in Cyber Security

Chief Information Security Officers (CISOs) are at the forefront of the AI transformation, tasked with protecting their organisations from an evolving landscape of risks and vulnerabilities. Understanding how AI integrates into security frameworks is crucial for them to stay ahead of malicious actors. This article delves into the AI revolution's implications for cyber security, highlighting the challenges, concerns, and the evolving roles for CISOs navigating this new terrain.

RBAC in ManageEngine CloudSpend: Empowering teams with secure access

Let’s think about a scenario where an IT operations team needs to track cost anomalies but does not require access to budget configurations or administrative settings. They have to go through the ticketing process to get sufficient access. Managing access to cost data and ensuring the right stakeholders have the appropriate permissions becomes a challenge.

Agentic AI Security Isn't Just A Technical Problem - It's a Strategic One

If you’ve started exploring how to secure AI agents in your environment (or even just reading about it), you likely already know that it’s not as straightforward as applying traditional AppSec practices. AI agents aren’t just another workload or API to monitor, they’re dynamic, semi-autonomous entities operating at the intersection of user intent, agent behavior, and enterprise systems. And not all AI agents are created equal or secure.