
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 03 Apr 2026 17:14:50 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Building a security overview dashboard for actionable insights]]></title>
            <link>https://blog.cloudflare.com/security-overview-dashboard/</link>
            <pubDate>Tue, 10 Mar 2026 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare's new Security Overview dashboard transforms overwhelming security data into prioritized, actionable insights, empowering defenders with contextual intelligence on vulnerabilities.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>For years, the industry’s answer to threats was “more visibility.” But more visibility without context is just more noise. For the modern security team, the biggest challenge is no longer a lack of data; it is the overwhelming surplus of it. Most security professionals start their day navigating a sea of dashboards, hunting through disparate logs to answer a single, deceptively simple question: "What now?"</p><p>When you are forced to pivot between different tools just to identify a single misconfiguration, you’re losing the window of opportunity to prevent an incident. That’s why we built a revamped Security Overview dashboard: a single interface designed to empower defenders, by moving from reactive monitoring to proactive control.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48MDFWpOUvJ1oHgj1SpHtf/6753298792d1a4cbfb7fb0766d255431/image7.png" />
          </figure><p><sup><i>The new Security Overview dashboard.</i></sup></p>
    <div>
      <h2>From noise to action: rethinking the security overview </h2>
      <a href="#from-noise-to-action-rethinking-the-security-overview">
        
      </a>
    </div>
    <p>Historically, dashboards focused on showing you <i>everything</i> that was happening. But for a busy security analyst, the more important question is, "What do I need to fix right now?"</p><p>To solve this, we are introducing Security Action Items. This feature acts as a functional bridge between detection and investigation, surfacing vulnerabilities, so you no longer have to hunt for them. To help you triage effectively, items are ranked by criticality:</p><ul><li><p>Critical: Urgent risks requiring immediate attention to prevent exploitation.</p></li><li><p>Moderate: Issues that should be addressed to maintain a strong security posture.</p></li><li><p>Low: Best-practice optimizations and hardening suggestions.</p></li></ul><p>By filtering by Insight Type (such as Suspicious Activity or Insecure Configuration), you can tailor your workflow to the specific threats your organization faces most.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15hwrdwgNlDPvxCk96FZJr/7951b2e27767082b61d835e929d57bb9/image1.png" />
          </figure><p>One of the most common causes of a breach isn't the absence of a security tool, it’s the fact that the tool was never turned on or was configured incorrectly. We call this the configuration gap.</p><p>The new Detection Tools module eliminates this blind spot. Instead of digging through nested settings pages to see if your traffic is actually being inspected, we provide a high-level status of your entire Cloudflare security stack in one view:</p><ul><li><p>Are your primary shields active, or are you in "Log Only" mode during a period of increased volatility? </p></li><li><p>Are you discovering shadow APIs, or are you flying blind?</p></li></ul><p>By surfacing these tools directly alongside your Security Action Items, we move the conversation from <i>"</i>Do we have this tool?" to "Is this tool actively protecting us right now?"</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/yXmNWAN2vDNQ02fw2spLL/4ece4d88e8a58826e2c8f472ba9aaac9/Screenshot_2026-03-09_at_18.48.17.png" />
          </figure><p>A high-level summary is only as good as the data behind it. To make the transition from a red flag to a solution seamless, we have unified the visibility of our Suspicious Activity cards. These cards now live in two strategic places: the Security Overview and the Security Analytics page.</p><p>If you spot a Suspicious Activity card on your Overview page that piques your interest, there is no need to manually navigate to Analytics and re-create your filters. By clicking on the card, you are deep-linked directly into the Security Analytics dashboard with all the relevant filters automatically applied. This eliminates the "tab switching tax" that slows down incident response, keeping your workflow fluid and your response times fast.</p>
    <div>
      <h2>How we built our new security overview dashboard</h2>
      <a href="#how-we-built-our-new-security-overview-dashboard">
        
      </a>
    </div>
    <p>To maintain a proactive defense, our engine produces and refreshes over 10 million actionable insights every day to ensure protection is always current.</p><p>Operating at this level presents two distinct engineering challenges. The first is scale: processing massive volumes of data seamlessly. The second and arguably harder challenge, is breadth. True security is horizontal, spanning your entire stack. To generate actionable insights that give you a comprehensive view of your risks and vulnerabilities, our engine must validate everything from simple SSL certificates to complex AI bot configurations.</p><p>To solve this, we built a system composed of smaller, specialized micro services, which we call checkers. Each checker is a subject-matter expert for a specific part of your stack, such as DNS records. The distribution of our checkers allows them to scale independently, hooked into the system in two ways: scheduled configuration checks or real-time listeners that flag a risk the instant an event occurs.</p><p><b>1. Scheduled checks</b>: We deploy this mode for risks that need deep inspection. These are triggered by an orchestrator (scheduler), which periodically pushes tasks for the checkers to execute. We distribute the checker workload across a massively parallel system. For example, a task sent to the DNS checker might be: "Scan all the DNS related configurations of zone <a href="http://xyz.com">xyz.com</a> and find anomalies."</p><p>The checkers pick up these tasks independently. They use their specialized intelligence to scan through the assets and configurations. In the case of the DNS checker, it uses specialized and intelligent rules to scan all the DNS assets and configurations of a zone, be it A/AAAA/CNAME records or DMARC or SPF records. </p><p>This is what the insight lifecycle looks like: </p><ol><li><p>The checker activates when a message is received. </p></li><li><p>The checker collects relevant assets (e.g., DNS records) about the zone or account.</p></li><li><p>The checker runs several checks to verify the status of the asset, e.g., if a CNAME record points to a server.</p></li><li><p>If the state or configuration doesn’t meet the required threshold, an insight is flagged.</p></li><li><p>During the next check, if the insight persists, the timestamp is updated.</p></li><li><p>If the insight has been remedied during the next check, it will be removed from the database.</p></li></ol>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1YwJ45kqLIdiHWoT29x6tR/13d3d31f58325776a781c7465d5f6aa3/image4.png" />
          </figure><p><b>2. Event handlers: </b>The checkers operate on a schedule round the clock, whereas the event handlers function in real-time. They listen to signals and events from our control plane.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6qUqsqqth0RZag7GDNeK1/8f09a8275d5ea8ca4223718e22c0e9f1/image5.jpg" />
          </figure><p>This is what the real-time ruleset insight lifecycle looks like:</p><ol><li><p>A WAF rule configuration is modified.</p></li><li><p>An event containing details of the change is triggered immediately.</p></li><li><p>The ruleset handler, which is actively listening, kicks into action.</p></li><li><p>The handler detects an anomaly, e.g, you have enabled the Cloudflare Managed Ruleset but left it in "Log Only" mode.</p></li><li><p>The handler deduces that the attacks are being recorded but not blocked.</p></li><li><p>The handler registers an insight and makes it available on the dashboard.</p></li><li><p>If the configuration has been updated to a secure setting, the handler clears the insight.</p></li></ol><p>The real-time nature of Ruleset handlers allow us to flag a misconfiguration or confirm a fix instantly.</p>
    <div>
      <h3>Unifying security visibility with contextual insights</h3>
      <a href="#unifying-security-visibility-with-contextual-insights">
        
      </a>
    </div>
    <p>Our customers have consistently asked for more than just visibility: they’ve asked for context. While a notification that a record is misconfigured is helpful, it’s only half the story. To take immediate, confident action, defenders need to know the "so what?" including the business impact and the technical root cause. To address this, we have developed Contextual Insights for our detection engine. By surfacing data like traffic volume to a broken A record, we ensure that every insight is an invitation to act.</p><p>We are starting this journey of Contextual Insights by expanding the depth of our DNS insights. Instead of just flagging a broken record, we correlate the dangling signal with additional context and real-time traffic data to provide the “why” and the “how”:</p><ul><li><p>Target Context: We identify exactly which deleted resource (e.g., an old S3 bucket or cloud instance) the record points to.</p></li><li><p>Impact Context: We show you exactly how many users are still trying to reach that broken record.</p></li></ul><p>Let’s explore the ‘Dangling A/AAAA/CNAME record’ insights as an example. </p><p>To provide these insights, we must analyze the massive amount of data flowing through our network every second. To give you an idea of the work happening behind the scenes:</p><p>100+ million DNS records are scanned weekly by our engine. In the past week, our engine identified over 1 million dangling DNS records. The majority (97%) are Dangling A/AAAA records and the remaining 3% are Dangling CNAME records.</p><p>Of the 31,000 dangling CNAME records:</p><ul><li><p>95% point to Microsoft Azure services.</p></li><li><p>3% point to AWS Elastic Beanstalk.</p></li></ul><p>This signals that these are high-priority targets for a subdomain takeover. An attacker can claim these abandoned cloud resources and immediately control your subdomain, allowing them to launch phishing attacks or spread misinformation under your trusted brand. With thousands of hits, a dangling record presents a high-priority risk for a subdomain takeover, necessitating immediate remediation to instantly gauge and mitigate the threat.</p><p>Our DNS checker uses a two-step process to generate these insights</p><ul><li><p>Step 1: Active Insight detection</p><ul><li><p>The checker starts verification as soon as it gets the message to start a scan. This process has been described in <a href="https://docs.google.com/document/d/1zpAjKdCU_80KZtIXwpHnlq05xGV54gTA-KehiOvlVc0/edit?tab=t.0#bookmark=id.fmv2o2tkjmvj"><u>an earlier section</u></a>.</p></li></ul></li><li><p>Step 2: Contextual enrichment</p><ul><li><p>Once the insight is generated, the checkers gather relevant contextual data for the insight that helps the customer in understanding the impact of the security insight.</p></li></ul></li></ul><p>Let’s explore in depth how the dangling DNS record insights are generated, focusing on the two-phase process involved. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XNrfkKD9isLHsatUWb7tU/d8117d53a02e82b799da97563be30576/image3.jpg" />
          </figure>
    <div>
      <h4>Phase 1: Active Verification</h4>
      <a href="#phase-1-active-verification">
        
      </a>
    </div>
    <p>A DNS record pointing to an IP address often looks perfectly valid on paper, even if the server behind it was decommissioned months ago. To confirm if a risk is real, our engine has to step outside the network and probe the destination in real-time. The checks performed can be categorized as follows:</p><p><b>The dead server check (A/AAAA records): </b>For records pointing directly to IP addresses, we verify if the destination is still active. Our engine spins up a dedicated egress proxy to attempt a connection to the origin over HTTP and HTTPS. By using this special gateway, we simulate how a real user would connect from outside Cloudflare’s network. If the connection times out or the server returns a "404 Not Found" error, we confirm the resource is dead. This proves the DNS record is "dangling", a live signpost pointing to an empty lot.</p><p><b>The takeover check (CNAME records): </b>Domain aliases (CNAMEs) often delegate traffic to third-party services, like a helpdesk or storage bucket. If you cancel that service but forget to delete the DNS record, you create a "dangling" link that attackers can claim.</p><p>To find these, our engine performs a 3-step process:</p><ol><li><p>First, we trace the chain by recursively resolving the CNAME record to find its final destination (e.g., <code>my-bucket.s3.amazonaws.com</code>).</p></li><li><p>Next, we identify the provider by checking if that destination belongs to a known cloud service like AWS, Azure, or Shopify.</p></li><li><p>Finally, we confirm vacancy. Each cloud provider returns specific error patterns when a resource doesn't exist  (e.g., S3's "NoSuchBucket"). We probe the destination URL and match against these patterns to confirm if the resource is claimable.</p></li></ol><p>If our engine detects that a resource has been released but the DNS record remains, we create an insight, prompting you to remove the record before an attacker can take over your subdomain. </p>
    <div>
      <h4>Phase 2: Context Enrichment</h4>
      <a href="#phase-2-context-enrichment">
        
      </a>
    </div>
    <p>Once a record is verified as broken, we add the necessary context to the insight that helps you take better action. The checker connects to different systems to gather the required context. For dangling insights, we focus on three critical dimensions:</p><ul><li><p><b>Traffic Volume (The Impact) </b>Our global ClickHouse clusters are a treasure trove of information. To understand if the record is actually in use, the checker queries our global ClickHouse clusters to sum up the total DNS queries for that record over the last 7 days. This valuable context lets you prioritize the remedy. A record with 0 queries can be fixed when you have time; a record with 10,000 queries is an active vulnerability that needs to be patched immediately.</p></li></ul><p>Query to the clickhouse looks like: </p>
            <pre><code>SELECT query_name,
       sum(_sample_interval) as total
  FROM &lt;dnslogs_table_name&gt;
 WHERE account_id = {{account_id}}
   AND zone_id = {{zone_id}}
   AND timestamp &gt;= subtractDays(today(), 7)
   AND timestamp &lt; today()
   AND query_name in ('{{record1}}', '{{record2}}', ...)
 GROUP BY query_name</code></pre>
            <p>The query asks “How many times has this specific broken record been requested by real users in the last seven days?”</p><ul><li><p><b>Infrastructure owner (The Target) </b>Knowing <i>who</i> owns the destination infrastructure is    vital for both remediation and severity assessment. </p></li></ul><p><b>For IP records (A/AAAA):</b> We identify the network owner (ASN) through the latest geolocation data from a Cloudflare <b>R2 bucket</b> and performing high-speed lookups in memory. It tells you exactly where the dead resource lived (e.g., "Google Cloud" vs. "DigitalOcean"), speeding up your investigation. </p><p><b>For CNAME Records:</b> We identify the specific <b>Hosting Provider</b> (e.g., AWS S3, Shopify). This dictates the risk level. If a record points to a provider known for easy takeovers (like S3), we mark it as <b>Critical</b>; otherwise, it is <b>Moderate</b>.</p><ul><li><p><b>DNS TTL </b>We also extract the TTL (Time To Live) value directly from the record configuration.</p></li></ul><p>This tells you the "lag time" of your fix. If you delete a dangling record with a high TTL (e.g., 24 hours), it will remain cached in resolvers around the world for a full day, meaning the vulnerability stays open even after you patch it. Knowing this helps you manage expectations during an incident response.</p>
    <div>
      <h2>Looking forward</h2>
      <a href="#looking-forward">
        
      </a>
    </div>
    <p>While this experience is launching at the domain level today, we know that for enterprise customers, security isn't managed just one domain at a time. Our roadmap is focused on bringing this intelligence to the account level next. Soon, security teams can use a centralized view that aggregates security action items and prioritizes the most critical risks to remediate across all of their Cloudflare domains.</p><p>Security shouldn't feel like a game of catch-up. For too long, the complexity of managing application security has given the advantage to the attacker. Through our architecture of specialized checkers and real-time event handlers, we detect potential risks and enrich them with critical context, ensuring defenders can respond with speed and precision.</p><p>The new Security Overview is now the starting point for your day, a place where risk data is transformed into a prioritized strategy. <a href="https://dash.cloudflare.com"><u>Log in to the Cloudflare dashboard</u></a> today to explore your new Application Security Overview page!</p> ]]></content:encoded>
            <category><![CDATA[Security Posture Management]]></category>
            <category><![CDATA[Application Security]]></category>
            <guid isPermaLink="false">4AGzrx6ToYWMvoSNm9sojx</guid>
            <dc:creator>Rachel Smith</dc:creator>
            <dc:creator>Hemanth Kasula</dc:creator>
        </item>
        <item>
            <title><![CDATA[Translating risk insights into actionable protection: leveling up security posture with Cloudflare and Mastercard]]></title>
            <link>https://blog.cloudflare.com/attack-surface-intelligence/</link>
            <pubDate>Tue, 10 Mar 2026 05:05:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare will be integrating Mastercard’s RiskRecon attack surface intelligence capabilities to help you eliminate Internet-facing blind spots while continuously monitoring and closing security gaps. ]]></description>
            <content:encoded><![CDATA[ <p>Every new domain, application, website, or API endpoint increases an organization's attack surface. For many teams, the speed of innovation and deployment outpaces their ability to catalog and protect these assets, often resulting in a "target-rich, resource-poor" environment where unmanaged infrastructure becomes an easy entry point for attackers.</p><p>Replacing manual, point-in-time audits with automated security posture visibility is critical to growing your Internet presence safely. That’s why we are happy to announce a planned integration that will enable the continuous discovery, monitoring and remediation of Internet-facing blind spots directly in the Cloudflare dashboard: Mastercard’s RiskRecon attack surface intelligence capabilities.</p><p>Information Security practitioners in pay-as-you-go and Enterprise accounts will be able to preview the integration in the third quarter of 2026.</p>
    <div>
      <h3>Attack surface intelligence can spot security gaps before attackers do</h3>
      <a href="#attack-surface-intelligence-can-spot-security-gaps-before-attackers-do">
        
      </a>
    </div>
    <p>Mastercard’s RiskRecon attack surface intelligence identifies and prioritizes external vulnerabilities by mapping an organization's entire internet footprint using only publicly accessible data. As an outside-in scanner, the solution can be deployed instantly to uncover "shadow IT," forgotten subdomains, and unauthorized cloud servers that internal, credentialed scans often miss. By seeing what an attacker sees in real time, security teams can proactively close security gaps before they can be exploited.</p><p>But what security gaps are attackers typically looking to exploit? In a <a href="https://www.riskrecon.com/report-six-lessons-from-10-years-of-ransomware-attacks"><u>2025 study</u></a> of 15,896 organizations that had experienced security breaches, Mastercard found that unpatched software, exposed services (e.g. databases, remote administration), weak application security (e.g. missing authentication) and outdated web encryption were frequent hallmarks, as seen in the graph below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70o4e4XoPHJN1x5OpeNP9x/f6a9f3854368a7f83eccad14412a89a6/image2.png" />
          </figure><p>The same study also found that organizations with significant cybersecurity posture gaps in these areas were 5.3x more likely to be hit by a ransomware attack, and 3.6x more likely to suffer a data breach compared to companies that maintain good cybersecurity hygiene.</p>
    <div>
      <h3>Why Cloudflare and Mastercard are partnering</h3>
      <a href="#why-cloudflare-and-mastercard-are-partnering">
        
      </a>
    </div>
    <p>This partnership combines Mastercard’s attack surface intelligence—which identifies security gaps—with Cloudflare’s ability to fix them. Organizations can use Mastercard’s data to find shadow assets, such as forgotten domains or unprotected cloud instances, and secure them by routing traffic through Cloudflare’s proxy. This allows for the immediate deployment of security controls without changing the underlying website or application.</p><p>Based on a sample of approximately 388,000 organizations spanning over 18 million systems, Mastercard’s attack surface intelligence shows that systems using Cloudflare as a proxy have significantly better security hygiene than those that do not:</p><ul><li><p><b>Software Patching:</b> 53% fewer software vulnerabilities</p></li><li><p><b>Web Encryption:</b> 58% fewer SSL/TLS issues</p></li><li><p><b>System Reputation:</b> 98% fewer instances of malicious behavior (e.g. communicating with botnet command and control servers, hosting phishing sites).</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69JeczWmG5UioBEK2odUv/08cda631baac7a38422b31a82f36c0a2/image5.png" />
          </figure><p>The table below provides additional details on the security posture insights provided by Mastercard. These insights are generated by passively scanning publicly accessible hosts, web applications, and configurations. </p>
<table><thead>
  <tr>
    <th><span>Category</span></th>
    <th><span>Security Check</span></th>
    <th><span>Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>Software Patching</span></td>
    <td><span>Application Servers</span></td>
    <td><span>Unpatched application server software.</span></td>
  </tr>
  <tr>
    <td><span>OpenSSL</span></td>
    <td><span>Unpatched OpenSSL.</span></td>
  </tr>
  <tr>
    <td><span>CMS Patching</span></td>
    <td><span>Unpatched content management system software.</span></td>
  </tr>
  <tr>
    <td><span>Web Servers</span></td>
    <td><span>Unpatched webserver software.</span></td>
  </tr>
  <tr>
    <td><span>Application Security</span></td>
    <td><span>CMS Authentication</span></td>
    <td><span>Enumeration of content management system administration interfaces publicly exposed to the internet.</span></td>
  </tr>
  <tr>
    <td><span>High Value System Encryption</span></td>
    <td><span>Enumeration of systems that collect sensitive data that do not have encryption implemented.</span></td>
  </tr>
  <tr>
    <td><span>Malicious Code</span></td>
    <td><span>Enumeration of systems containing malicious code (Magecart).</span></td>
  </tr>
  <tr>
    <td><span>Web Encryption</span></td>
    <td><span>Certificate Expiration Date</span></td>
    <td><span>SSL certificate expired.</span></td>
  </tr>
  <tr>
    <td><span>Certificate Valid Date</span></td>
    <td><span>SSL certificate valid date not yet valid.</span></td>
  </tr>
  <tr>
    <td><span>Encryption Hash Algorithm</span></td>
    <td><span>Weak SSL encryption hash algorithm.</span></td>
  </tr>
  <tr>
    <td><span>Encryption Key Length</span></td>
    <td><span>Weak SSL encryption key length.</span></td>
  </tr>
  <tr>
    <td><span>Certificate Subject</span></td>
    <td><span>Invalid SSL certificate subject.</span></td>
  </tr>
  <tr>
    <td><span>Exposed Services / Network Filtering</span></td>
    <td><span>Unsafe Network Services</span></td>
    <td><span>Enumeration of unsafe network services running on the system such as databases (e.g. SQL Server, PostgreSQL) and remote access services (e.g. RDP, VNC).</span></td>
  </tr>
  <tr>
    <td><span>IoT Devices</span></td>
    <td><span>Enumeration of IoT devices such as printers, embedded system interfaces, etc.</span></td>
  </tr>
</tbody></table>
    <div>
      <h3>Comprehensive domain discovery, continuous posture visibility, and remediation</h3>
      <a href="#comprehensive-domain-discovery-continuous-posture-visibility-and-remediation">
        
      </a>
    </div>
    <p><a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Cloudflare Security Insights</u></a> in <a href="https://www.cloudflare.com/application-services/products/"><u>Cloudflare’s Application Security</u></a> suite currently identifies risks—such as DNS misconfigurations, weak web encryption, or inactive WAF rules—for any domain already proxied by Cloudflare. However, a significant security gap remains: you cannot protect domains you don’t know exist.</p><p>The integration with Mastercard will eliminate these blind spots. By continuously profiling the Internet footprint of over 12 million organizations, Mastercard identifies domains, hosts, and software stacks associated with your company, even if they aren't yet behind a Cloudflare proxy. This will allow Security Insights to surface shadow IT and unprotected hosts, enabling you to secure them with Cloudflare’s WAF and DDoS protection. </p><p>Visibility is only the first step; understanding the criticality of discovered assets is what allows security teams to prioritize findings. Each host is assigned a criticality level:</p><ul><li><p><b>High Criticality:</b> Assigned to hosts that collect sensitive data, require authentication, or run sensitive network services like database listeners or remote access.</p></li><li><p><b>Medium Criticality:</b> Assigned to hosts running brochure websites that are adjacent to high-criticality systems, such as those residing on the same class-C network.</p></li><li><p><b>Low Criticality:</b> Assigned to hosts running brochure websites that are not adjacent to any critical systems.</p></li></ul><p>Below is a fictitious example of an organization with many domains that they are unaware of. Of these discovered domains, only one is currently proxied by Cloudflare. Within Security Insights, you will be able to visualize this level of detail for shadow domains and hosts. </p>
<table><colgroup>
<col></col>
<col></col>
<col></col>
<col></col>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Domain</span></th>
    <th><span>Protected by Cloudflare</span></th>
    <th><span>Host (IP)</span></th>
    <th><span>Criticality</span></th>
    <th><span>Location</span></th>
    <th><span>Hosting Provider</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>search-engine.net</span></td>
    <td><span>Yes</span></td>
    <td><a href="http://portal.search-engine.net/"><span>portal.search-engine.net</span></a><span> (10.XXX.XX.5)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Springfield, United States</span></td>
    <td><span>Cloudflare</span></td>
  </tr>
  <tr>
    <td><span>zenith-industries.com</span></td>
    <td><span>No</span></td>
    <td><a href="http://vpn.zenith-industries.com/"><span>vpn.zenith-industries.com</span></a><span> (10.XXX.XXX.106)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Helsinki, Finland</span></td>
    <td><span>CloudNode-Services</span></td>
  </tr>
  <tr>
    <td><span>stratus-global.com</span></td>
    <td><span>No</span></td>
    <td><a href="http://store.stratus-global.com/"><span>store.stratus-global.com</span></a><span> (10.XXX.XXX.124)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Munich, Germany</span></td>
    <td><span>SwiftStream-Tech</span></td>
  </tr>
  <tr>
    <td><span>core-logic.cl</span></td>
    <td><span>No</span></td>
    <td><a href="http://extranet.core-logic.cl/"><span>extranet.core-logic.cl</span></a><span> (10.XXX.XXX.178)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Santiago, Chile</span></td>
    <td><span>SecureCanopy Ltd.</span></td>
  </tr>
  <tr>
    <td><span>vanguard-labs.com</span></td>
    <td><span>No</span></td>
    <td><a href="http://extranet.vanguard-labs.com/"><span>extranet.vanguard-labs.com</span></a><span> (10.XXX.XX.197)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Metropolis, United States</span></td>
    <td><span>GlobalSoft Systems</span></td>
  </tr>
  <tr>
    <td><span>fusion-id.com</span></td>
    <td><span>No</span></td>
    <td><a href="http://fusion-id.com/"><span>fusion-id.com</span></a><span> (10.XXX.XXX.146)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Prague, Czechia</span></td>
    <td><span>EuroData-Hub</span></td>
  </tr>
  <tr>
    <td><span>norden-biotech.no</span></td>
    <td><span>No</span></td>
    <td><a href="http://store.norden-biotech.no/"><span>store.norden-biotech.no</span></a><span> (10.XXX.XX.124)</span></td>
    <td><span>MEDIUM</span></td>
    <td><span>Chicago, United States</span></td>
    <td><span>SwiftStream-Tech</span></td>
  </tr>
  <tr>
    <td><span>norden-biotech.se</span></td>
    <td><span>No</span></td>
    <td><a href="http://store.norden-biotech.se/"><span>store.norden-biotech.se</span></a><span> (10.XXX.XX.124)</span></td>
    <td><span>MEDIUM</span></td>
    <td><span>Chicago, United States</span></td>
    <td><span>SwiftStream-Tech</span></td>
  </tr>
</tbody></table><p><sup><i>Example of shadow domains and unprotected hosts associated with an organization</i></sup></p><p>Mastercard will also allow continuous visibility into the security posture of Internet-facing systems including in areas like software patching, exposed network services (e.g., databases, remote access) and application security (e.g., unauthenticated CMSes) — complementing <a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Cloudflare Security Insights</u></a>, as shown below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/T3ff3WNmedjbAO76X0fQr/d04a60dc4e1d7093832eec12f653e92e/image1.png" />
          </figure><p><sup><i>Security Insights dashboard with shadow domains, unproxied hosts, and posture findings</i></sup></p><p>These<b> </b>insights are only useful if they lead to action. Instead of just telling you that a domain or host is at risk, <a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Cloudflare Security Insights</u></a> will guide you to fixing them. Possible steps include enabling a Cloudflare proxy (and by extension DDoS and bot protection for shadow zones and hosts), enabling security controls (such as turning on the Web Application Firewall, or WAF) and enforcing stricter TLS encryption to mitigate the specific risks identified by the scan.</p>
    <div>
      <h3>What’s next: updated security insights dashboard</h3>
      <a href="#whats-next-updated-security-insights-dashboard">
        
      </a>
    </div>
    <p>We are currently working on integrating Mastercard’s RiskRecon attack surface intelligence into the <a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Cloudflare Security Insights</u></a> dashboard to provide immediate visibility into shadow domains, unprotected hosts and the posture gaps associated with them.</p><p>With an increasing volume of insights, our roadmap also includes risk scoring and building AI-assisted diagnosis paths. That will mean a dashboard that doesn't just show you an insight, but proposes additional relevant correlations (such as traffic to an unpatched host) and suggests the specific WAF rule or <a href="https://blog.cloudflare.com/api-abuse-detection/"><u>API Shield</u></a> configuration required to neutralize it.</p><p>We would love to have you <a href="https://www.cloudflare.com/lp/mastercard-defense-program/"><u>join the waitlist here</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Posture Management]]></category>
            <category><![CDATA[Security Posture]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[Risk Management]]></category>
            <guid isPermaLink="false">50TFdPHZwAQHUcskN0xNgX</guid>
            <dc:creator>Bashyam Anant</dc:creator>
            <dc:creator>Kelly White (Guest author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[One platform to manage your company’s predictive security posture with Cloudflare]]></title>
            <link>https://blog.cloudflare.com/cloudflare-security-posture-management/</link>
            <pubDate>Tue, 18 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare introduces a single platform for unified security posture management, helping protect SaaS and web applications deployed across various environments.  ]]></description>
            <content:encoded><![CDATA[ <p>In today’s fast-paced digital landscape, companies are managing an increasingly complex mix of environments — from SaaS applications and public cloud platforms to on-prem data centers and hybrid setups. This diverse infrastructure offers flexibility and scalability, but also opens up new attack surfaces.</p><p>To support both business continuity and security needs, “security must evolve from being <a href="https://blog.cloudflare.com/welcome-to-security-week-2025/#how-can-we-help-make-the-internet-better"><u>reactive to predictive</u></a>”. Maintaining a healthy security posture entails monitoring and strengthening your security defenses to identify risks, ensure compliance, and protect against evolving threats. With our newest capabilities, you can now use Cloudflare to achieve a healthy posture across your SaaS and web applications. This addresses any security team’s ultimate (daily) question: <i>How well are our assets and documents protected</i>?</p><p>A predictive security posture relies on the following key components:</p><ul><li><p>Real-time discovery and inventory of all your assets and documents</p></li><li><p>Continuous asset-aware threat detection and risk assessment</p></li><li><p>Prioritised remediation suggestions to increase your protection</p></li></ul><p>Today, we are sharing how we have built these key components across SaaS and web applications, and how you can use them to manage your business’s security posture.</p>
    <div>
      <h3>Your security posture at a glance</h3>
      <a href="#your-security-posture-at-a-glance">
        
      </a>
    </div>
    <p>Regardless of the applications you have <a href="https://developers.cloudflare.com/reference-architecture/architectures/security/#using-cloudflare-to-protect-your-business"><u>connected to</u></a> Cloudflare’s global network, Cloudflare actively scans for risks and misconfigurations associated with each one of them on a <a href="https://developers.cloudflare.com/security-center/security-insights/how-it-works/#scan-frequency"><u>regular cadence</u></a>. Identified risks and misconfigurations are surfaced in the dashboard under <a href="https://dash.cloudflare.com/?to=/:account/security-center"><u>Security Center</u></a> as insights.</p><p>Insights are grouped by their severity, type of risks, and corresponding Cloudflare solution, providing various angles for you to zoom in to what you want to focus on. When applicable, a one-click resolution is provided for selected insight types, such as setting <a href="https://developers.cloudflare.com/ssl/edge-certificates/additional-options/minimum-tls/"><u>minimum TLS version</u></a> to 1.2 which is <a href="https://developers.cloudflare.com/ssl/reference/protocols/#decide-which-version-to-use"><u>recommended by PCI DSS</u></a>. This simplicity is highly appreciated by customers that are managing a growing set of assets being deployed across the organization.</p><p>To help shorten the time to resolution even further, we have recently added <a href="https://www.cloudflare.com/learning/access-management/role-based-access-control-rbac/"><u>role-based access control (RBAC)</u></a> to <a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Security Insights</u></a> in the Cloudflare dashboard. Now for individual security practitioners, they have access to a distilled view of the insights that are relevant for their role. A user with an <a href="https://developers.cloudflare.com/fundamentals/setup/manage-members/roles/"><u>administrator role</u></a> (a CSO, for example) has access to, and visibility into, all insights.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/bnaU55Fi2z9bxUxl5pf7o/818043fbba2ae13c5a7c4cb25e5e7ebc/1.png" />
          </figure><p>In addition to account-wide Security Insights, we also provide posture overviews that are closer to the corresponding security configurations of your SaaS and web applications. Let’s dive into each of them.</p>
    <div>
      <h3>Securing your SaaS applications</h3>
      <a href="#securing-your-saas-applications">
        
      </a>
    </div>
    <p>Without centralized posture management, SaaS applications can feel like the security wild west. They contain a wealth of sensitive information – files, databases, workspaces, designs, invoices, or anything your company needs to operate, but control is limited to the vendor’s settings, leaving you with less visibility and fewer customization options. Moreover, team members are constantly creating, updating, and deleting content that can cause configuration drift and data exposure, such as sharing files publicly, adding PII to non-compliant databases, or giving access to third party integrations. With Cloudflare, you have visibility across your SaaS application fleet in one dashboard.</p>
    <div>
      <h4>Posture findings across your SaaS fleet</h4>
      <a href="#posture-findings-across-your-saas-fleet">
        
      </a>
    </div>
    <p>From the account-wide Security Insights, you can review insights for potential SaaS security issues:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7JRKfYveWKayrMxdLxLvDB/1c3383209462917214ad9dc6584e98fe/2.png" />
          </figure><p>You can choose to dig further with <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/"><u>Cloud Access Security Broker (CASB)</u></a> for a thorough review of the misconfigurations, risks, and failures to meet best practices across your SaaS fleet. You can identify a wealth of security information including, but not limited to:</p><ul><li><p>Publicly available or externally shared files</p></li><li><p>Third-party applications with read or edit access</p></li><li><p>Unknown or anonymous user access</p></li><li><p>Databases with exposed credentials</p></li><li><p>Users without two-factor authentication</p></li><li><p>Inactive user accounts</p></li></ul><p>You can also explore the <i>Posture Findings </i>page, which provides easy searching and navigation across documents that are stored within the SaaS applications.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6skScbapgiG31w5qRoTCjG/ba3b069de8cce0c0bfcb9f011a2df954/3.png" />
          </figure><p>Additionally, you can create policies to prevent configuration drift in your environment. Prevention-based policies help maintain a secure configuration and compliance standards, while reducing alert fatigue for Security Operations teams, and these policies can prevent the inappropriate movement or exfiltration of sensitive data. Unifying controls and visibility across environments makes it easier to lock down regulated data classes, maintain detailed audit trails via logs, and improve your security posture to reduce the risk of breaches.</p>
    <div>
      <h4>How it works: new, real-time SaaS documents discovery</h4>
      <a href="#how-it-works-new-real-time-saas-documents-discovery">
        
      </a>
    </div>
    <p>Delivering SaaS security posture information to our customers requires collecting vast amounts of data from a wide range of platforms. In order to ensure that all the documents living in your SaaS apps (files, designs, etc.) are secure, we need to collect information about their configuration — are they publicly shared, do third-party apps have access, is <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a> enabled? </p><p>We previously did this with crawlers, which would pull data from the SaaS APIs. However, we were plagued with rate limits from the SaaS vendors when working with larger datasets. This forced us to work in batches and ramp scanning up and down as the vendors permitted. This led to stale findings and would make remediation cumbersome and unclear – for example, Cloudflare would be reporting that a file is still shared publicly for a short period after the permissions were removed, leading to customer confusion.</p><p>To fix this, we upgraded our data collection pipeline to be dynamic and real-time, reacting to changes in your environment as they occur, whether it’s a new security finding, an updated asset, or a critical alert from a vendor. We started with our Microsoft asset discovery and <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/microsoft-365/"><u>posture findings</u></a>, providing you real-time insight into your Microsoft Admin Center, OneDrive, Outlook, and SharePoint configurations. We will be rapidly expanding support to additional SaaS vendors going forward.</p>
    <div>
      <h5>Listening for update events from Cloudflare Workers</h5>
      <a href="#listening-for-update-events-from-cloudflare-workers">
        
      </a>
    </div>
    <p>Cloudflare Workers serve as the entry point for vendor webhooks, handling asset change notifications from external services. The workflow unfolds as follows:</p><ul><li><p><b>Webhook listener:</b> An initial Worker acts as the webhook listener, receiving asset change messages from vendors.</p></li><li><p><b>Data storage &amp; queuing:</b> Upon receiving a message, the Worker uploads the raw payload of the change notification to Cloudflare R2 for persistence, and publishes it to a Cloudflare Queue dedicated to raw asset changes.</p></li><li><p><b>Transformation Worker:</b> A second Worker, bound as a consumer to the raw asset change queue, processes the incoming messages. This Worker transforms the raw vendor-specific data into a generic format suitable for CASB. The transformed data is then:</p><ul><li><p>Stored in Cloudflare R2 for future reference.</p></li><li><p>Published on another Cloudflare Queue, designated for transformed messages.</p></li></ul></li></ul>
    <div>
      <h5>CASB Processing: Consumers &amp; Crawlers</h5>
      <a href="#casb-processing-consumers-crawlers">
        
      </a>
    </div>
    <p>Once the transformed messages reach the CASB layer, they undergo further processing:</p><ul><li><p><b>Polling consumer:</b> CASB has a consumer that polls the transformed message queue. Upon receiving a message, it determines the relevant handler required for processing.</p></li><li><p><b>Crawler execution:</b> The handler then maps the message to an appropriate crawler, which interacts with the vendor API to fetch the most up-to-date asset details.</p></li><li><p><b>Data storage:</b> The retrieved asset data is stored in the CASB database, ensuring it is accessible for security and compliance checks.</p></li></ul><p>With this improvement, we are now processing 10 to 20 Microsoft updates per second, or 864,000 to 1.72 million updates daily, giving customers incredibly fast visibility into their environment. Look out for expansion to other SaaS vendors in the coming months. </p>
    <div>
      <h3>Securing your web applications</h3>
      <a href="#securing-your-web-applications">
        
      </a>
    </div>
    <p>A unique challenge of securing web applications is that no one size fits all. An asset-aware posture management bridges the gap between a universal security solution and unique business needs, offering tailored recommendations for security teams to protect what matters.</p>
    <div>
      <h4>Posture overview from attacks to threats and risks</h4>
      <a href="#posture-overview-from-attacks-to-threats-and-risks">
        
      </a>
    </div>
    <p>Starting today, all Cloudflare customers have access to Security Overview, a new landing page customized for each of your onboarded domains. This page aggregates and prioritizes security suggestions across all your web applications:</p><ol><li><p>Any (ongoing) attacks detected that require immediate attention</p></li><li><p>Disposition (mitigated, served by Cloudflare, served by origin) of all proxied traffic over the last 7 days</p></li><li><p>Summary of currently active security modules that are detecting threats</p></li><li><p>Suggestions of how to improve your security posture with a step-by-step guide</p></li><li><p>And a glimpse of your most active and lately updated security rules</p></li></ol>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3YhmhUZbZbAIZryUuTodpV/2b9563ac7768348bb4be46abc5fef7b3/4.png" />
          </figure><p>These tailored security suggestions are surfaced based on your traffic profile and business needs, which is made possible by discovering your proxied web assets.</p>
    <div>
      <h4>Discovery of web assets</h4>
      <a href="#discovery-of-web-assets">
        
      </a>
    </div>
    <p>Many web applications, regardless of their industry or use case, require similar functionality: user identification, accepting payment information, etc. By discovering the assets serving this functionality, we can build and run targeted threat detection to protect them in depth.</p><p>As an example, bot traffic towards marketing pages versus login pages have different business impacts. Content scraping may be happening targeting your marketing materials, which you may or may not want to allow, while credential stuffing on your login page deserves immediate attention.</p><p>Web assets are described by a list of endpoints; and labelling each of them defines their business goals. A simple example can be <code>POST</code> requests to path <code>/portal/login</code>, which likely describes an API for user authentication. While the <code>GET</code> requests to path <code>/portal/login</code> denote the actual login webpage.</p><p>To describe business goals of endpoints, labels come into play. <code>POST</code> requests to the <code>/portal/login</code> endpoint serving end users and to the<code> /api/admin/login</code> endpoint used by employees can both can be labelled using the same <code>cf-log-in</code> <a href="https://developers.cloudflare.com/api-shield/management-and-monitoring/endpoint-labels/#managed-labels"><u>managed label</u></a>, letting Cloudflare know that usernames and passwords would be expected to be sent to these endpoints.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7jFh9mc7hyryXHIqeQwS9U/25ba022282b43cff9f09700d0ae81c76/5.png" />
          </figure><p>API Shield customers can already make use of <a href="https://developers.cloudflare.com/api-shield/management-and-monitoring/endpoint-labels/"><u>endpoint labelling</u></a>. In early Q2 2025, we are adding label discovery and suggestion capabilities, starting with three labels, <code>cf-log-in</code>, <code>cf-sign-up</code>, and <code>cf-rss-feed</code>. All other customers can manually add these labels to the <a href="https://developers.cloudflare.com/api-shield/management-and-monitoring/"><u>saved endpoints</u></a>. One example, explained below, is preventing disposable emails from being used during sign-ups. </p>
    <div>
      <h4>Always-on threat detection and risk assessment</h4>
      <a href="#always-on-threat-detection-and-risk-assessment">
        
      </a>
    </div>
    
    <div>
      <h5>Use-case driven threat detection</h5>
      <a href="#use-case-driven-threat-detection">
        
      </a>
    </div>
    <p>Customers told us that, with the growing excitement around generative AI, they need support to secure this new technology while not hindering innovation. Being able to discover LLM-powered services allows fine-tuning security controls that are relevant for this particular technology, such as inspecting prompts, limit prompting rates based on token usage, etc. In a separate Security Week blog post, we will share how we build Cloudflare Firewall for AI, and how you can easily protect your generative AI workloads.</p><p>Account fraud detection, which encompasses multiple attack vectors, is another key area that we are focusing on in 2025.</p><p>On many login and signup pages, a <a href="https://www.cloudflare.com/learning/bots/how-captchas-work/"><u>CAPTCHA</u></a> solution is commonly used to only allow human beings through, assuming only bots perform undesirable actions. Put aside that most visual CAPTCHA puzzles can be easily <a href="https://arstechnica.com/ai/2024/09/ai-defeats-traffic-image-captcha-in-another-triumph-of-machine-over-man/"><u>solved by AI</u></a> nowadays, such an approach cannot effectively solve the <i>root cause</i> of most account fraud vectors. For example, human beings using disposable emails to sign up single-use accounts to take advantage of signup promotions.</p><p>To solve this fraudulent sign up issue, a security rule currently under development could be deployed as below to block all attempts that use disposable emails as a user identifier, regardless of whether the requester was automated or not. All existing or future <code>cf-log-in</code> and <code>cf-sign-up</code> labelled endpoints are protected by this single rule, as they both require user identification.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sJzdnjp9UWrp35Hd3SsGB/db0959b457c555a4a1e93e5515a1e61f/6.png" />
          </figure><p>Our fast expanding use-case driven threat detections are all running by default, from the first moment you onboarded your traffic to Cloudflare. The instant available detection results can be reviewed through security analytics, helping you make swift informed decisions.</p>
    <div>
      <h5>API endpoint risk assessment</h5>
      <a href="#api-endpoint-risk-assessment">
        
      </a>
    </div>
    <p>APIs have their own set of risks and vulnerabilities, and today Cloudflare is delivering seven new risk scans through API Posture Management. This new capability of API Shield helps reduce risk by identifying security issues and fixing them early, before APIs are attacked. Because APIs are typically made up of many different backend services, security teams need to pinpoint which backend service is vulnerable so that development teams may remediate the identified issues.</p><p>Our new API posture management risk scans do exactly that: users can quickly identify which API endpoints are at risk to a number of vulnerabilities, including sensitive data exposure, authentication status, <a href="https://owasp.org/API-Security/editions/2023/en/0xa1-broken-object-level-authorization/"><u>Broken Object Level Authorization (BOLA)</u></a> attacks, and more.</p><p>Authentication Posture is one risk scan you’ll see in the new system. We focused on it to start with because sensitive data is at risk when API authentication is assumed to be enforced but is actually broken. <a href="https://developers.cloudflare.com/api-shield/security/authentication-posture/"><u>Authentication Posture</u></a> helps customers identify authentication misconfigurations for APIs and alerts of their presence. This is achieved by scanning for successful requests against the API and noting their authentication status. API Shield scans traffic daily and labels API endpoints that have missing and mixed authentication for further review.</p><p>For customers that have configured session IDs in API Shield, you can find the new risk scan labels and authentication details per endpoint in API Shield. Security teams can take this detail to their development teams to fix the broken authentication.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21jVSrwsgfjKlyxyOZ5Qye/7963d95ea28a41f5e2b4f331ab5d5060/7.png" />
          </figure><p>We’re launching today with <a href="https://developers.cloudflare.com/api-shield/management-and-monitoring/endpoint-labels/"><u>scans</u></a> for authentication posture, sensitive data, underprotected APIs, BOLA attacks, and anomaly scanning for API performance across errors, latency, and response size.</p>
    <div>
      <h3>Simplify maintaining a good security posture with Cloudflare</h3>
      <a href="#simplify-maintaining-a-good-security-posture-with-cloudflare">
        
      </a>
    </div>
    <p>Achieving a good security posture in a fast-moving environment requires innovative solutions that can transform complexity into simplicity. Bringing together the ability to continuously assess threats and risks across both public and private IT environments through a single platform is our first step in supporting our customers’ efforts to maintain a healthy security posture.</p><p>To further enhance the relevance of security insights and suggestions provided and help you better prioritize your actions, we are looking into integrating Cloudflare’s global view of threat landscapes. With this, you gain additional perspectives, such as what the biggest threats to your industry are, and what attackers are targeting at the current moment. Stay tuned for more updates later this year.</p><p>If you haven’t done so yet, <a href="https://dash.cloudflare.com/?to=/:account/security-center"><u>onboard your SaaS and web applications</u></a> to Cloudflare today to gain instant insights into how to improve your business’s security posture.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security Posture Management]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Security Center]]></category>
            <category><![CDATA[SAAS Security]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">41Rkgr3IVvWI5n1DpmMDkJ</guid>
            <dc:creator>Zhiyuan Zheng</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>John Cosgrove</dc:creator>
            <dc:creator>Frank Meszaros</dc:creator>
            <dc:creator>Yugesha Sapte</dc:creator>
        </item>
    </channel>
</rss>