Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Generative AI: Essential Insights for CISOs on Security Impacts

Generative AI (GenAI) is transforming the cybersecurity landscape, requiring Chief Information Security Officers (CISOs) and their teams to adapt quickly to both opportunities and challenges, according to the Gartner report 4 Ways Generative AI Will Impact CISOs and Their Teams. As organizations integrate GenAI into business processes, it is critical to secure not only the technology’s development but also its consumption across the enterprise.

Deliver Secure, Performant & Resilient Digital Citizen Services

Join Government Technology and Cloudflare for a live webinar where a panel of experts will explore how public sector agencies can leverage a platform-based approach to seamlessly navigate the shift to digital services—without compromising on efficiency, security, or simplicity.

Federal Zero Trust Maturity: From Backburner to Afterburner

Three years ago, the Federal Zero Trust Strategy promised that the government would learn and adjust as new technologies and practices emerge. That time is now. Let’s explore key innovations that advance Zero Trust maturity when your industry partner uses a federal-first approach. Watch this video to learn more.

Optimize Wordpress performance with Cloudflare's Automatic Platform Optimization

Does your WordPress site load too slowly? Cloudflare’s Automatic Platform Optimization (APO) plugin caches and serves your site from a global network, making site loads up to 72% faster! APO allows Cloudflare to serve your entire WordPress site on its global edge network, and would take HTML and CSS that would not typically be cached on the CDN to be done so automatically.

API Risks & Threats: What Wallarm's Reports Reveal #APIThreats #CyberResearch #APIExploitation

Wallarm conducts quarterly and annual API threat reports to provide data-driven insights on API vulnerabilities, risks, and attacks. This research helps the industry understand emerging threats and improve API security strategies. Stay informed with the latest findings!

Securing Datadog's cloud infrastructure: Our playbook and methodology

At Datadog, we build and operate a complex, self-managed infrastructure that spans multiple cloud providers and serves many customers in regulated environments. We need to secure this large, distributed infrastructure while maintaining strict uptime requirements and scaling our finite people resources. In this post, I’ll detail the playbook that we use on Datadog’s Cloud Security team for securing our infrastructure, including.

How Claude + MCP + Vanta could help auditors

At Vanta, we’re always looking to experiment, learn, and stay at the forefront of AI. Recently, we built a proof of concept to explore how auditors could interact more effectively with audits and the data within them. Our experiment used Anthropic’s Claude, the open source MCP (Model Context Protocol), and Vanta’s API to enable users to ask deeper questions of Vanta’s compliance data. ‍ ‍

Banish bots from your Waiting Room and improve wait times for real users

With Cloudflare Waiting Room, you can safeguard your site from traffic surges by placing visitors in a customizable, virtual queue. Previously, many site visitors waited in the queue alongside bots, only to find themselves competing for inventory once in the application. This competition is inherently unfair, as bots are much faster and more efficient than humans. As a result, humans inevitably lose out in these high-demand situations, unable to secure inventory before bots sweep it all up.

Fuzzing Forward: Lowering Barriers to Secure Code with AI

Introducing “Spark” Code Intelligence’s AI Test Agent Fuzz testing is a proven powerhouse for uncovering critical bugs, yet its full potential often goes untapped due to the heavy manual workload it demands. But what if that effort could be a thing of the past? Enter “Spark” Code Intelligence’s AI Test Agent—a revolutionary solution that automates the discovery of vulnerabilities, bringing the power of advanced security testing, like fuzzing, into reach for all.