Are you prepared for the next attack? The state of application security in 2024
The latest application and API security threat research
Web applications are central to modern life. For governments, they are an important channel to communicate information to the public and provide essential services. For businesses, they serve as a source of revenue, efficiency, and customer insights,
Take a close look at the most important trends shaping the web application and API threat landscape today, including vulnerability exploitation, DDoS attacks, bot traffic, and third-party supply chain risk.
Join Cloudflare Application Security experts Daniele Molteni, Product Manager and Catherine Newcomb, Product Marketing Manager, for a discussion on the latest application and API security threat research sourced from Cloudflare’s global network, including:
- Shifts in blocked web applications and API traffic
- The growth and increased complexity of DDoS attacks
- The weaponization of vulnerabilities at breakneck speed
- The growing risk of shadow APIs
- Risks associated with third-party components such as scripts, outbound connections, and cookies
Watch now.
Provided by Cloudflare
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
HPE's new Cray system is a pocket powerhouseNews Hewlett Packard Enterprise (HPE) had unveiled new HPC storage, liquid cooling, and supercomputing offerings ahead of SC25
-
High performance and long battery life: How Dell AI PCs offer the best of both worldsUnlocking the true potential of on-device AI requires a perfect balance between software and hardware
-
Maximizing Microsoft 365 Security: How Cloudflare enhances protection and adds valueWebinar Strengthen your defenses, proactively block attacks, and reduce risks
-
VPN replacement phases: Learn others’ real-world approachesWebinar Accelerate Zero Trust adoption
-
How businesses can ensure cloud uptime over the holidaysIn-depth Preparation is a critical consideration and could be the difference between success and disaster
-
Understanding NIS2 directives: The role of SASE and Zero TrustWebinar Enhance cybersecurity measures to comply with new regulations
-
From legacy to leading edge: Transforming app delivery for better user experiencesWebinar Meet end-user demands for high-performing applications
-
Navigating evolving regional data compliance and localization regulations with Porsche InformatikWebinar A data localization guide for enterprises
-
Strategies for improving security team efficiencyWebinar Get more value from your digital investments
-
Understanding NIS2 directives: The role of SASE and Zero TrustWebinar Enhance cybersecurity measures to comply with new regulations
