Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LLM Data Leakage Prevention: 10 Best Practices

Forget the breach notification email. Forget the security audit trail. A fintech user opened their chatbot last year, saw someone else’s account details staring back at them, and filed a support ticket. That’s how the team found out their LLM had been leaking customer PII for weeks. LLM data security isn’t a checkbox. It’s an architecture decision. Make it before the first model call, not after the first breach. Most teams get one expensive lesson before they understand that.

What Data Is Required for EU AI Act Compliance

The EU AI Act places significant emphasis on documentation because regulatory oversight depends on an organization's ability to demonstrate how its AI systems operate and how associated risks are managed. Compliance is not determined solely by how an AI system performs, but by whether the organization can provide evidence that appropriate governance, risk controls, and oversight mechanisms are in place throughout the system lifecycle.

The CISO's Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking for an ROI timeline. But as CISO, you're the one who has to answer when the inevitable question comes up: "How do we know this is secure?" If you're like most security leaders, you're caught between two impossible positions. Say yes to AI initiatives without proper security controls, and you're responsible when something goes wrong.

Ep. 49 - Iran's AI-Powered Cyber Warfare: The Next Phase of the Global Cyber Threat

Iranian cyber operations are entering a new era. In this final episode of our Iran cyber series, we explore how Iranian APT groups are evolving — leveraging AI, targeting supply chains, and bypassing the billion-dollar security stacks built to stop them. Hosts Tova Dvorin and Adrian Culley break down the emerging threats shaping 2026, including: The perimeter is gone. Your weakest vendor may now be your biggest risk.

AI Security for Apps is now generally available

Cloudflare’s AI Security for Apps detects and mitigates threats to AI-powered applications. Today, we're announcing that it is generally available. We’re shipping with new capabilities like detection for custom topics, and we're making AI endpoint discovery free for every Cloudflare customer—including those on Free, Pro, and Business plans—to give everyone visibility into where AI is deployed across their Internet-facing apps.

What is Agentic AI vs GenAI?

Everyone knows ChatGPT, but Agentic AI is where the real work happens. In this Agentic AI vs GenAI breakdown, we explain why Agentic AI is the next major leap, and what it means for your business and career. Here’s the difference: Generative AI (GenAI): Creates content. You ask, it writes, summarizes, or creates. Agentic AI: Does work. It is built on three core components: a brain (reasons), memory (context), and tools (the key that lets agents touch real systems like APIs and databases).