Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing simple and secure egress policies by hostname in Cloudflare's SASE platform

Cloudflare’s SASE platform is on a mission to strengthen our platform-wide support for hostname- and domain-based policies. This mission is being driven by enthusiastic demands from our customers, and boosted along the way by several interesting engineering challenges. Today, we’re taking a deep dive into the first milestone of this mission, which we recently released in open beta: egress policies by hostname, domain, content category, and application. Let’s dive right in!

How much does Essential Eight cost? A complete breakdown

The Australian Essential Eight is a cybersecurity framework that helps organisations protect their systems against common cyber threats. Although compliance isn’t mandatory for non-government entities, the Australian Cyber Security Centre (ACSC) strongly encourages organisations to implement it due to its broad coverage. ‍ Depending on your organisation’s size and tech environment, implementing the Essential Eight can require a significant investment.

Aligning Software Security Practices with the EU CRA Requirements

As the European Cyber Resilience Act (CRA)'s enforcement date approaches (October 2026), cybersecurity requirements on manufacturers, developers, and service providers responsible for software and hardware connected to the internet will need to start thinking - if they haven't already -about what they need to do to comply. It may seem like a long time off, but the earlier you start, the better.

How Threat Campaign Detection Helps Cut Through Alert Fatigue

Security fatigue gets attention for a reason. Phishing emails, authentication prompts, and constant vigilance all take a toll. But alert fatigue is the deeper, more destructive force. It overwhelms analysts, delays response, and creates blind spots that adversaries exploit. Security teams today are buried under noisy alerts and fragmented tooling. False positives waste time. Manual triage eats up valuable analyst hours. Eventually, burnout sets in and threats slip by. It is not a hypothetical risk.

Fintech vs. Fincrime: Are Startups Built to Defend or Just to Scale?

In the fast-moving world of fintech, growth is the north star. New digital banks, payment platforms, investment apps, and embedded finance startups are launching faster than ever - often with slick user experiences and powerful value propositions. But there's one critical area that doesn't always scale as fast: cybersecurity. As fintech continues to disrupt traditional banking, financial cybercrime is evolving just as rapidly. Sophisticated fraud rings, API exploits, AI-generated phishing, and deepfake identity attacks are no longer future threats - they are already here.

The Smart Way to Structure Your Agency's Service Rate Cards

Rate cards settings play a defining role in your business success. Research shows that 58% of clients bring up pricing during their first conversation with you. Rate cards? Absolutely essential. They're a vital piece of your business strategy. Don't forget them! Smart pricing goes beyond just putting numbers on paper. A solid agency rate card sets clear expectations, builds client trust, and prevents uncomfortable pricing discussions later.

Customer assurance portals: Enhancing trust and accelerating sales cycles

Effective leadership demands innovative strategies that address customer concerns while streamlining business processes. One such strategy involves the use of customer assurance portals to build trust and accelerate sales cycles. As business leaders explore new avenues to stay ahead, understanding the power and potential of these portals is imperative.

Inside the AI Threat Landscape: From Jailbreaks to Prompt Injections and Agentic AI Risks

AI has officially moved out of the novelty phase. What began with people messing around with LLM-powered GenAI tools for content creation has rapidly evolved into a complex web of agentic AI systems that form a critical part of the modern corporate landscape. However, this transformation has given new life to old threats, transforming the API security landscape all over again.

Key Findings: The Role of DSPM in Addressing AI and Cloud Threats

As the cyber threat landscape continues to evolve, organizations face unprecedented challenges in securing their digital assets. With 49% of workloads already in the cloud and the rise of AI-driven threats, organizations are increasingly vulnerable to data breaches, compliance failures, and malicious actions.