Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From the endpoint to the prompt: a unified data security vision in Cloudflare One

Cloudflare One has grown a lot over the years. What started with securing traffic at the network now spans the endpoint and SaaS applications – because that’s where work happens. But as the market has evolved, the core mission has become clear: data security is enterprise security. Here’s why. We don’t enforce controls just to enforce controls.

What Is AI Agent Sandboxing? Kubernetes-Native Enforcement Explained

You’re in a Slack thread at 9 AM on a Tuesday. A developer is asking why their LangChain agent can’t reach an external API anymore. You wrote the NetworkPolicy that blocked it. But you also can’t explain why you wrote that specific rule—because you wrote it based on what you guessed the agent would do, not what it actually does. You don’t have behavioral data. You don’t have an observation period.

AI Agent Security Framework for Cloud Environments

Your security team has done the homework. You’ve built a risk taxonomy covering agent escape, prompt injection, tool misuse, and data exfiltration. You’ve mapped those threats against your agent architecture’s seven layers. You’ve classified your agents by autonomy level — separating read-only chatbots from fully autonomous workflow agents that can book meetings, modify databases, and invoke other agents. The risk assessment is thorough.

AI Impact Summit 2026 Highlights | FinTech, AI & Data Security Insights #ai

AI Impact Summit 2026 Highlights | AI, FinTech & Data Security Insights from Delhi This video covers our 5-day experience at AI Impact Summit 2026 in New Delhi, one of India's leading technology events focused on Artificial Intelligence, FinTech, Data Security, and Compliance. During the summit, we connected with industry leaders, CISOs, FinTech professionals, and AI innovators, discussing the latest developments in data protection, AI governance, cybersecurity, and enterprise AI adoption.

AI Deepfakes & Laptop Farms: Inside the 2026 Cloudflare Threat Report

In this episode of This Week in NET, host João Tomé is joined by Cloudflare threat intelligence experts Brian Carter and Chris Pacey to break down the 2026 Cloudflare Threat Report and what it reveals about today’s cyber threat landscape. We discuss how threat intelligence helps organizations prioritize risks, how attackers are increasingly leveraging automation and AI tools, and why botnets, supply-chain attacks, and credential-theft campaigns continue to evolve.

AI Usage Monitoring: Gaining Full Visibility Into GenAI Activity

Generative AI tools have entered the workplace through every possible channel. Employees use them to draft emails, summarize documents, and write code. This organic adoption creates a visibility gap for security and IT leaders. They must protect corporate data without blocking innovation. With these challenges in mind, this article explains how organizations can track GenAI use. To move from identifying risks to enabling secure adoption, it highlights practical steps to protect data while enabling productivity.

Economic and Technological Factors Behind Dedicated and Virtual Server Costs

In recent years, businesses, developers, and digital service providers have increasingly noticed a steady rise in the cost of renting dedicated and virtual servers. While at first glance such changes may appear to be simple pricing adjustments by hosting companies, a deeper analysis reveals a complex interaction of global supply chains, semiconductor manufacturing constraints, rising demand for computing resources, and the increasing cost of key hardware components such as memory modules, processors, and high-performance storage devices.

EU AI Act Compliance Explained for CISOs and GRC Leaders

‍The European Union's Artificial Intelligence Act (EU AI Act) represents the first comprehensive attempt by a major regulator to establish legal oversight of artificial intelligence. Its objective is to ensure that AI systems deployed across the EU operate safely, transparently, and in a manner that protects fundamental rights.

Agentic AI Security: Automated False Positive Suppression

LimaCharlie's Agentic SecOps Workspace (ASW) is a platform where AI doesn't just advise, it acts. By connecting to your security infrastructure via API, the ASW executes operations end-to-end at a fraction of the cost of traditional AI SOC platforms. The result is genuine AI security automation that operates independently and serves as a force multiplier, giving every analyst on your team access to senior-level expertise. Alert fatigue is one of the most persistent challenges in security operations.

Why Static Privilege Models Break Down in Agentic AI Security

Earlier this year, AWS experienced a 13-hour outage that was reportedly linked to one of its own internal AI coding tools. Apparently, their Kiro agentic coding tool thought that there was an issue with the code in the environment, and that the best way to fix it was to simply burn it to the ground.