
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sun, 12 Apr 2026 10:27:50 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Australia’s cybersecurity strategy is here and Cloudflare is all in]]></title>
            <link>https://blog.cloudflare.com/australia-cybersecurity-strategy-is-here-and-cloudflare-is-all-in/</link>
            <pubDate>Mon, 18 Dec 2023 23:00:21 GMT</pubDate>
            <description><![CDATA[ In support of the Australian Cyber Security Strategy 2023-2030 (The Strategy), we want to share how we can help empower Australian organizations and individuals to become more secure ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Xvgd9uobFhXc5IliGOtjn/866e7b238b4a877ac75ecd10b5a53b15/Australia-Cloudflare-1.png" />
            
            </figure><p>We are thrilled about Australia’s <a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/2023-2030-australian-cyber-security-strategy">strategic direction</a> to build a world-leading cyber nation by 2030. As a world-leading cybersecurity company whose mission is to help build a better Internet, we think we can help.</p><p>Cloudflare empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare is trusted by millions of organizations – from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.</p><p>Cloudflare first established a footprint in Australia in 2012 when we launched our <a href="/sydney-australia-cloudflares-15th-data-center/">15th data center</a> in Sydney (our network has since grown to span over 310 cities in 120 countries/regions). We support a multitude of customers in Australia and New Zealand, including some of Australia’s largest banks and <a href="https://www.cloudflare.com/the-net/digital-native-mindset/">digital natives</a>, with our world-leading <a href="https://www.cloudflare.com/security/">security products and services</a>. For example, Australia’s leading tech company <a href="https://www.canva.com/">Canva</a>, whose service is used by over 35 million people worldwide each month, uses a broad array of Cloudflare’s products — spanning use cases as diverse as <a href="https://www.cloudflare.com/zero-trust/products/access/">remote application access</a>, to <a href="https://www.cloudflare.com/learning/serverless/what-is-serverless/">serverless development</a>, and even bot management to help <a href="https://www.cloudflare.com/case-studies/canva/">Canva protect its network</a> from attacks.</p><p>In support of the <a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/2023-2030-australian-cyber-security-strategy">Australian Cyber Security Strategy 2023-2030</a> (The Strategy), released on November 22, 2023, we want to share how we can help empower Australian organizations and individuals to become more secure. The Strategy is clear about the value of cooperation and the vital role of the private sector. We couldn’t agree more, and we look forward to collaborating with individuals, industry, non-profits, and the government to help ensure that Australia’s society and economy is <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protected from malicious cyber threats</a>.</p><p>The Strategy outlines six shields – six layers of defense against cyber attacks, with Australian businesses and individuals in the center (where they should be). Here’s where we think Cloudflare can play a role in each of the shields:</p>
    <div>
      <h3>Shield 1: Strong businesses and citizens</h3>
      <a href="#shield-1-strong-businesses-and-citizens">
        
      </a>
    </div>
    <p>The Strategy rightly focuses on helping those individuals and organizations that typically do not have the capability or resources to employ basic cybersecurity tools. We agree that supporting the most vulnerable is a crucial goal as these groups are often powerless to protect themselves against relentless attacks. A 2023 <a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/smallbusiness">survey</a> by the Australian Cyber Security Center shows that 62% of surveyed Small Medium Enterprises (SMEs) were victims of a cyber attack. Cloudflare’s recent <a href="https://www.cloudflare.com/press-releases/2023/asia-pacific-businesses-do-not-believe-they-are-fully-prepared/">survey</a> of nearly 4000 security leaders across Asia Pacific shows that 81% of medium and 77% of small-sized organizations suffered a cybersecurity incident over the previous 12 months.</p><p>Here we believe we have <i>a lot</i> to offer. Our mission is to help build a more secure, more private and more reliable Internet. A key part of that mission is democratizing cybersecurity – making cyber tools <a href="/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/">readily available</a> for all, including SMEs, non-profits, and individuals. For example, our <a href="https://www.cloudflare.com/en-gb/plans/free/">free plan</a> makes available our world-leading <a href="https://www.cloudflare.com/ddos/">DDoS</a> and <a href="https://www.cloudflare.com/application-services/products/waf/">WAF protection</a> for millions of websites, apps, and APIs all around the world, including in Australia. We provide our suite of <a href="/teams-plans/">Zero Trust Tools for free</a> to organizations with up to 50 users (more on Zero Trust below).</p><p>We also offer our world-leading, Enterprise-level cyber protection products and services at no cost to the most vulnerable populations, including human rights organizations, journalists and healthcare organizations. One example of this is <a href="https://citizensgbr.org/">Citizens of the Great Barrier Reef</a>, which is a participant of Cloudflare’s <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>. Through Project Galileo, they have access to our most advanced cybersecurity tools and support — freeing them to focus on their mission.</p>
    <div>
      <h3>Shield 2: Safe technology</h3>
      <a href="#shield-2-safe-technology">
        
      </a>
    </div>
    <p>We agree with the Strategy’s push for Secure-by-Design and Secure-by-Default technology – these are in fact our <a href="/secure-by-default-understanding-new-cisa-guide/">core principles</a> when developing our products and services in order to improve security for our end users automatically. We’ve taken this approach in deploying <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall (WAF)</a> protections for all of our users, such as the steps we took to protect our customers (including our free plan customers) against the <a href="/secure-how-your-servers-connect-to-the-internet-today/">log4j vulnerability</a>, and in creating a machine-learning computed WAF attack score that enables customers to block likely attacks, even when they don’t match existing attack signatures.</p><p>This shield also notes both the opportunities and challenges brought by critical emerging technologies, such as quantum computing and <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">artificial intelligence (AI)</a>. Cloudflare is getting ready for the quantum future – in order to protect against possible attacks from quantum computers, we believe that post-quantum cryptography tools should be readily available. In late 2022, <a href="/post-quantum-for-all/">we announced</a> that by default, all websites and APIs served through Cloudflare, including those on our free plan, support post-quantum hybrid key agreement.</p><p>We also provide tools that help ensure that <a href="/zero-trust-ai-security/">AI can be used securely</a>. Given the incredible growth in this space, it’s critical that businesses can ensure that they are able to leverage AI innovation and growth — and doing so both securely and safely.</p>
    <div>
      <h3>Shield 3: World-class threat sharing and blocking</h3>
      <a href="#shield-3-world-class-threat-sharing-and-blocking">
        
      </a>
    </div>
    <p>We applaud the government’s efforts to strengthen threat sharing and threat blocking. For <a href="https://www.cloudflare.com/learning/security/glossary/what-is-threat-intelligence/">threat intelligence</a> to be effective across sectors and industries, there needs to be a flow of information not only between government and industry, but also between industry peers. The support in the strategy for developing Information Sharing and Analysis Centers (ISACs) will help create a threat sharing culture within industry and support Australia to build a more mature cybersecurity ecosystem.</p><p>Cloudflare has supported ISACs to understand the impact of emerging vulnerabilities. One recent example concerned the <a href="/zero-day-rapid-reset-http2-record-breaking-ddos-attack">HTTP/2 Rapid Reset Vulnerability</a>, which resulted in record-breaking DDoS attacks. By working with our peers and sharing the latest insights we were able to help member organizations proactively protect themselves and their users.</p>
    <div>
      <h3>Shield 4: Protected critical infrastructure</h3>
      <a href="#shield-4-protected-critical-infrastructure">
        
      </a>
    </div>
    <p>This shield focuses on <a href="https://www.cloudflare.com/the-net/government/critical-infrastructure/">critical infrastructure (CI) </a>– those institutions vital to the nation’s functioning. Cloudflare understands the crucial importance of protecting CI: many of our customers are CI in their respective jurisdictions, including in Australia. Our tools help keep them, and those that rely on them, secure. For example, we mitigated threats to our customers when <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">Anonymous Sudan</a> and Killnet <a href="/ddos-attacks-on-australian-universities/">attacked and issued threats</a> to Australian universities, airports, and hospitals in March 2023.</p><p>Equally concerning are the smaller critical infrastructure organizations that are the foundation of our communities: the neighborhood hospital, regional water treatment facility, and local energy provider that meet our basic needs like keeping the lights on and clean water running. Also vital, and noted in the Strategy – the small-yet-crucially-important companies that form the supply chains of our nationwide critical systems. These smaller organizations frequently lack the know-how and financial resources to deploy basic cyber security, let alone best-in-class cybersecurity tools and services. We felt that we could step up to help meet this crucial gap, so at the end of 2022, we launched <a href="/project-safekeeping/">Project Safekeeping</a> in Australia and other global markets, providing no-cost and no-time limit Enterprise-level cybersecurity products for these critical entities.</p><p>Finally, we applaud the Strategy’s goal to strengthen the overall cyber posture of the Australian Commonwealth government, in particular by developing a Zero Trust culture. <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> is generally considered a best practice in cybersecurity – the belief that organizations should not trust based on relationship to a perimeter (such as if someone is in the office), but instead must verify everything and everyone trying to connect to its systems before granting access. Zero Trust principles are being <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implemented</a> successfully across the private sector and governments, and a Zero Trust strategy will certainly help uplift the security maturity and posture of Australia and its government.</p><p>Cloudflare is already providing our world-leading <a href="https://www.cloudflare.com/zero-trust/">Zero Trust tools and services</a> to government departments across Australia, both state and federal. For example, Australia’s National Disability Insurance Agency (NDIS) utilizes Cloudflare’s suite of security products to protect their environment and provide secure access into their application ecosystem.</p>
    <div>
      <h3>Shield 5: Sovereign capabilities</h3>
      <a href="#shield-5-sovereign-capabilities">
        
      </a>
    </div>
    <p>This shield focuses on the essentials for having a diverse and professional cyber workforce in order to foster a vibrant Australian cyber ecosystem. Cloudflare also <a href="https://www.cloudflare.com/diversity-equity-and-inclusion/">strives</a> for a diverse workforce in order to have better business outcomes. To improve diversity across departments and roles, we rely on inclusive recruiting practices to help ensure a fair process, and we train employees on mitigating unconscious bias. In Australia, we actively foster diversity in cyber through internal associate programs designed to promote diverse groups into cyber engineering roles. We also run a series of external workshops and sessions aimed at the broader Australian women in cyber community, in order to foster greater learning and networking opportunities in this traditionally male-dominated sector.</p>
    <div>
      <h3>Shield 6: Resilient region and global leadership</h3>
      <a href="#shield-6-resilient-region-and-global-leadership">
        
      </a>
    </div>
    <p>As a global company whose mission is to help build a better Internet, we believe it is vitally important for the international community to defend a free and open Internet. We were thrilled to see the Strategy acknowledge this as a key pillar of Australia's cyber diplomacy. A free and open Internet is, in fact, both <a href="/investing-in-security-to-protect-data-privacy/">safer</a> – as global knowledge is necessary to stop attacks that could come from anywhere in the world; and more <a href="/eu-network-usage-fees/">resilient</a>, as the Internet needs multiple global connection points to ensure that cyber attacks do not impact Internet access.</p><p>In addition, we fully agree with the Strategy that global technology markets should be competitive, reflecting a diverse pool of technology vendors. We strongly believe in the importance of having a vibrant security ecosystem, where different security providers can help mitigate the risk of services being compromised, helping to avoid security events.</p><p>Finally, this shield recognizes that international cyber standards must be harmonized. As a cybersecurity technology provider that adheres to multiple cybersecurity standards all around the world, we couldn’t agree more. Overlapping and redundant standards are a massive operational burden that do not equate to greater levels of security. However, onerous compliance regimes do prevent governments from having the best security technology available, given that many companies, particularly SMEs, simply can’t afford the high costs associated with numerous cybersecurity certifications.</p><p>We are thrilled to support Australia’s mission to be a world cyber leader by 2030. We look forward to our continued collaboration with the Australian government and industry in order to help ensure that everyone – from critical infrastructure, government, SMEs, nonprofits, to Australian citizens – can be more secure.</p> ]]></content:encoded>
            <category><![CDATA[Australia]]></category>
            <guid isPermaLink="false">7J627fJzAAE4f58k4QJ7tX</guid>
            <dc:creator>Carly Ramsey</dc:creator>
            <dc:creator>Fernando Serto</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust — Not a Buzzword]]></title>
            <link>https://blog.cloudflare.com/zero-trust-not-a-buzzword/</link>
            <pubDate>Wed, 20 Oct 2021 01:00:23 GMT</pubDate>
            <description><![CDATA[ Over the last few years, Zero Trust, a term coined by Forrester, picked up a lot of steam. Zero Trust, in its core, is a network architecture and security framework focusing on not having a distinction between external and internal access environments, and never trusting users/roles.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Over the last few years, Zero Trust, a term coined by Forrester, has picked up a lot of steam. Zero Trust, at its core, is a network architecture and security framework focusing on not having a distinction between external and internal access environments, and never trusting users/roles.</p><p>In the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a>, the network only delivers applications and data to authenticated and authorized users and devices, and gives organisations visibility into what is being accessed and to apply controls based on behavioral analysis. It gained popularity as the media reported on several high profile breaches caused by misuse, abuse or exploitation of VPN systems, breaches into end-users’ devices with access to other systems within the network, or breaches through third parties — either by exploiting access or compromising software repositories in order to deploy malicious code. This would later be used to provide further access into internal systems, or to deploy malware and potentially ransomware into environments well within the <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">network perimeter</a>.</p><p>When we first started talking to CISOs about Zero Trust, it felt like it was just a buzzword, and CISOs were bombarded with messaging from different cybersecurity vendors offering them Zero Trust solutions. Recently, another term, <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE (Secure Access Services Edge)</a>, a framework released by Gartner, also came up and added even more confusion to the mix.</p><p>Then came COVID-19 in 2020, and with it the reality of lockdowns and remote work. And while some organizations took that as an opportunity to accelerate projects around modernising their access infrastructure, others, due to procurement processes, or earlier technology decisions, ended up having to take a more tactical approach, ramping up existing remote access infrastructure by adding more licenses or capacity without having an opportunity to rethink their approach, nor having an opportunity to take into account the impact of their employees’ experience while working remotely full time in the early days of the pandemic.</p><p>So we thought it might be a good time to check on organizations in Asia Pacific, and look at the following:</p><ul><li><p>The pandemic’s impact on businesses</p></li><li><p>Current IT security approaches and challenges</p></li><li><p>Awareness, adoption and <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementation of Zero Trust</a></p></li><li><p>Key drivers and challenges in adopting Zero Trust</p></li></ul><p>In August 2021, we commissioned a research company called <a href="https://theleadingedge.com/">The Leading Edge</a> to conduct a survey that touches on these topics. The <a href="https://www.cloudflare.com/press-releases/2021/asia-pacific-businesses-identify-zero-trust-as-key-to-addressing-cyberattacks/">survey</a> was conducted across five countries — Australia, India, Japan, Malaysia, and Singapore, and 1,006 IT and cybersecurity decision-makers and influencers from companies with more than 500 employees participated.</p><p>For example, 54% of organisations said they saw an increase in security incidents in 2021, when compared to the previous year, with 83% of respondents who experienced security incidents saying they had to make significant changes to their IT security procedures as a result.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ClgGbTL0oXY82RdaYXIDw/e2a993b600cdf9779abdb38b9c4e0b0a/pasted-image-0.png" />
            
            </figure><p>Increase in security incidents when compared to 2020. ▲▼ Significantly higher/lower than total sample</p><p>And while the overall APAC stats are already quite interesting, I thought it would be even more fascinating to look at the unique characteristics of each of the five countries, so let’s have a look:</p>
    <div>
      <h3>Australia</h3>
      <a href="#australia">
        
      </a>
    </div>
    <p>Australian organisations reported the highest impact of COVID-19 when it comes to their IT security approach, with 87% of the 203 respondents surveyed saying the pandemic had a moderate to significant impact on their IT security posture. The two biggest cities in Australia (Sydney and Melbourne) were in lockdown for over 100 days, each in the second half of 2021 alone. With the extensive lockdowns, it’s not a surprise that 48% of respondents reported challenges with maximising remote workers’ productivity without exposing them or their devices to new risks.</p><p>With 94% of organisations in Australia having reported they will be implementing a combination of return to office and work from home, building an effective and uniform security approach can be quite challenging. If you combine that with the fact that 62% saw an increase in security incidents over the last year, we can safely assume IT and cybersecurity decision-makers and influencers in Australia have been working on improving their security posture over the last year, even though 40% of respondents indicated they struggled to secure the right level of funding for such projects.</p><p>Australia seems to be well advanced on the journey into implementing Zero Trust when compared to other four countries included in the report, with 45% of the organisations that have adopted Zero Trust starting their Zero Trust journey over the last one to four years. Australian organisations have always been known for fast cloud adoption, and even in the early 2010s Australians were already consuming IaaS quite heavily.</p>
    <div>
      <h3>India</h3>
      <a href="#india">
        
      </a>
    </div>
    <p>When compared to the other countries in the report, India has a very challenging environment when it comes to working from home, with Internet connectivity being inconsistent, even though there’s been significant improvement in internet speeds in the country, and problems like power outages regularly occurring in certain areas outside of city centres. Surprisingly, the biggest challenge reported by Indian organisations was that they could benefit from newer security functionality, which goes to show that legacy security approaches are still widely present in India. Likewise, 37% of the respondents reported that their access technologies are too complex, which supports the previous point that newer security functionality would be beneficial to the same organisations.</p><p>When asked about their concerns around the shift in how their users will access applications, one of the biggest concerns raised by 59% of the respondents was around applications being protected by VPN or IP address controls alone. This shows Zero Trust would fit really well with their IT strategy moving forward, as controls can now be applied to users and their devices.</p><p>Another interesting point to make, and where Zero Trust can be leveraged, is 65% of respondents saying internal IT and security staff shortage and cuts is a huge challenge. Most security technologies out there would require special skills to build, maintain and operate, and this is where simplifying access with the right Zero Trust approach could really help improve the productivity of those teams.</p>
    <div>
      <h3>Japan</h3>
      <a href="#japan">
        
      </a>
    </div>
    <p>When we look at the results of the survey across all five countries, it’s fairly obvious that Japan didn't seem to have quite the same challenges as the other countries when the pandemic started. Businesses continued to operate normally for most of 2020 and 2021, which would explain why the impact wasn’t in line with the other countries. Having said that, 51% of the respondents surveyed in Japan still reported they saw a moderate to significant impact in their IT security approach, which is still significant, even though lower than the other countries.</p><p>Japanese organisations also reported an increase in the number of security incidents, which supports the fact that even though the impact of the pandemic wasn’t as severe as in other countries, 45% of the respondents still reported an increase in security incidents, and 63% still had to make changes to their IT security procedures as a direct result of incidents.</p>
    <div>
      <h3>Malaysia</h3>
      <a href="#malaysia">
        
      </a>
    </div>
    <p>Malaysia rated second highest (at 80%) in our report on the impact the pandemic has had on organisations’ IT security approach, and rated highest on both employees using their home networks and using personal devices for work, at 94% and 92% respectively. From a security perspective, that poses a significant impact to an organization's security posture and <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">increases the attack surface</a> for an organisation substantially.</p><p>From a risk perspective, Malaysian organisations rated lack of management over employees’ devices pretty highly, with 65% of them expressing concerns over it. Other areas worth calling out were applications and data being exposed to the public Internet, and lack of visibility into staff activity inside applications.</p><p>With 57% of the respondents calling out an increase in security incidents when compared to the previous year, 89% of the respondents said they had to make significant changes to their IT security procedures due to either security incidents or attack attempts against their environments.</p>
    <div>
      <h3>Singapore</h3>
      <a href="#singapore">
        
      </a>
    </div>
    <p>In Singapore, 79% of IT and cybersecurity decision-makers and influencers reported that the pandemic has impacted their IT security approach, and two in five organisations said they could benefit from more modern security functionality as a direct result of the impact caused by the pandemic. 52% of the organisations also reported an increase in security incidents compared to 2020, with almost half having seen an increase in phishing attempts.</p><p>Singaporean organisations were also not immune to a significant increase in IT security spend as a direct result of the pandemic, with 62% of them having reported more investment in security. Some of the challenges these organisations were facing were related to applications being directly exposed to the public Internet, limited oversight on <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">third party access</a> and applications being protected by username and password only.</p><p>While Singapore is known for high speed home Internet, it was quite a surprise for me to see that 40% of organisations surveyed reported issues with latency or slow connectivity into applications via VPN. This goes to show that the problem of concentrating traffic into a single location can impact application performance even across relatively small geographies, and even if bandwidth is not necessarily a problem, like what happens in Singapore.</p>
    <div>
      <h3>The work in IT security never stops</h3>
      <a href="#the-work-in-it-security-never-stops">
        
      </a>
    </div>
    <p>While there were distinct differences in each country around IT security posture and Zero Trust adoption, across Asia Pacific, the similarities are what stand out the most:</p><ul><li><p>Cyberattacks continue to rise</p></li><li><p>Flexible work is here to stay</p></li><li><p>Skilled in-house IT security workers are a scarce resource</p></li><li><p>Need to educate stakeholders around Zero Trust</p></li></ul><p>These challenges are not easy to tackle, add to these the required focus on improving employee experience, reducing operational complexities, better visibility into 3rd party activity, and tighter controls due to the increase in security incidents, and you’ve got a heck of a huge responsibility for IT.</p><p>And this is where <a href="https://www.cloudflare.com/teams/">Cloudflare</a> comes in. Not only have we been helping our <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">employees work security</a> throughout the pandemic, we have also been helping organisations all over the globe streamline their IT security operations when it comes to users accessing applications through <a href="https://www.cloudflare.com/teams/access/">Cloudflare Access</a>, or securing their activity on the Internet through our <a href="https://www.cloudflare.com/teams/gateway/">Secure Web Gateway</a> services, which even includes controls around SaaS applications and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a>, all with the best possible user experience.</p><p>So come <a href="https://www.cloudflare.com/lp/apac-zt-survey/">talk to us</a>!</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[VPN]]></category>
            <guid isPermaLink="false">3HCRPXIE4L2YTDnRAGFPRs</guid>
            <dc:creator>Fernando Serto</dc:creator>
        </item>
    </channel>
</rss>