Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is Zero Trust?

With the adoption of cloud computing, mobile devices, and the Internet of Things (IoT), the traditional network perimeter no longer exists. This has created challenges for security professionals, requiring a new approach to cybersecurity. Zero Trust has emerged as a transformative security model. Let’s take a closer look into what Zero Trust is, how it works, and the benefits it offers to modern enterprises.

From Regulation to Reality: DORA Compliance and What It Means for Your Software Security

The Digital Operational Resilience Act (DORA) is a landmark regulation designed to enhance the digital resilience of financial institutions in the EU. Effective from January 17, 2025, DORA mandates the development and maintenance of a robust ICT risk management framework. Here’s an overview of the five pillars and how the right software security measures can help you comply.

Elevating Cyber Resilience with AI-powered Security

In today’s digital age, as organizations modernize their applications and infrastructure by embracing hybrid cloud environments, API-centric architectures, and AI-driven technologies to enhance customer experiences and productivity, they also face an unprecedented increase in cyber threats aimed at disrupting their operations.

Why Your Network Flow Analysis Fails (And How to Fix It)

A recent report reveals that 98% of businesses struggle with growing complexity in their cloud and on-premises infrastructures. This complexity creates major network flow analysis challenges. Organizations report widening visibility gaps in their networks 80% of the time. The network flow problems have become more critical than ever before. Gartner’s prediction shows that by 2027, 75% of employees will use technologies their IT teams cannot see.

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge

Two newcomers have made their way onto the ransomware threat group stage, becoming the biggest threat to the energy and utilities sector in 2025. According to the most recent data from Trustwave SpiderLabs’ Energy and Utilities Sector Deep Dive: Ransomware Threat Groups, Hunters International and Qilin (pronounced Chee Lin) displaced LockBit as the most active group attacking these sectors.

Cloud Security Automation with Torq + Sweet Security

For security teams, resolving a cloud incident takes an average of 10 days — time attackers can exploit to cause further damage. The problem? SOCs often lack the context and cloud security automation they need to respond faster. That’s where the partnership between Torq and Sweet Security changes the game.

Unified AI in XDR: A Single Source of Cyber Truth Date

WatchGuard Senior Product Marketing Manager Stephen Helm discusses how XDR can harness AI across your entire IT environment – correlating data from networks, Cloud services, VPN logs, and more into a single, AI-driven security framework. Cyber threats are evolving fast, and your clients rely on you to stay ahead.

No hallucinations here: track the latest AI trends with expanded insights on Cloudflare Radar

During 2024’s Birthday Week, we launched an AI bot & crawler traffic graph on Cloudflare Radar that provides visibility into which bots and crawlers are the most aggressive and have the highest volume of requests, which crawl on a regular basis, and more. Today, we are launching a new dedicated “AI Insights” page on Cloudflare Radar that incorporates this graph and builds on it with additional metrics that you can use to understand AI-related trends from multiple perspectives.