Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing XIoT in the Era of Convergence and Zero Trust

The rise of connected devices has fundamentally reshaped industries, enabling unprecedented levels of automation, efficiency, and innovation. These devices fall under the Extended Internet of Things (XIoT), a broad category encompassing traditional Internet of Things (IoT) devices, operational technology (OT), industrial control systems (ICS), the Internet of Medical Things (IoMT), and other connected assets that span enterprise IT and operational environments.

Unleashing improved context for threat actor activity with our Cloudforce One threat events platform

Today, one of the greatest challenges that cyber defenders face is analyzing detection hits from indicator feeds, which provide metadata about specific indicators of compromise (IOCs), like IP addresses, ASNs, domains, URLs, and hashes. While indicator feeds have proliferated across the threat intelligence industry, most feeds contain no contextual information about why an indicator was placed on the feed.

Extending Cloudflare Radar's security insights with new DDoS, leaked credentials, and bots datasets

Security and attacks continues to be a very active environment, and the visibility that Cloudflare Radar provides on this dynamic landscape has evolved and expanded over time. To that end, during 2023’s Security Week, we launched our URL Scanner, which enables users to safely scan any URL to determine if it is safe to view or interact with.

Cloudflare enables native monitoring and forensics with Log Explorer and custom dashboards

In 2024, we announced Log Explorer, giving customers the ability to store and query their HTTP and security event logs natively within the Cloudflare network. Today, we are excited to announce that Log Explorer now supports logs from our Zero Trust product suite. In addition, customers can create custom dashboards to monitor suspicious or unusual activity.

AI-Driven Vulnerability Management: How Generative AI is Transforming Cybersecurity

With the rapid and dynamic nature of the digital world of today, businesses are seeing a mounting high rate of cybersecurity attacks. Cyber attackers keep evolving and coming up with new methods of breaching their systems, which leaves security teams under immense pressure to identify, assess, and remediate vulnerabilities at scale. Traditional methods of vulnerability management are typically behind the curve because the sheer volume of threats is overwhelming.

Why Convert MP4 to WEBM in 2025? Benefits & Best Tools Explained

Many creators want high quality videos that load fast and don't hog data. In 2025 converting MP4 to WEBM is crucial because it delivers smaller file sizes and smoother playback on modern browsers. This shift means more efficient streaming and better user experiences.

API Honeypot Results: How Fast Do Hackers Strike? #CyberThreats #InstantDefense #HackerSpeed

New APIs are attacked in just 29 seconds, according to Wallarm’s API honeypot test. Batch requests can extract 10M records in under 10 seconds, making real-time protection essential. Learn how to secure APIs before attackers strike.