How to build your resilience against application layer threats
Addressing security threats with a consolidated cloud-based platform approach


Security threats are on the rise and the application layer remains one of the most common attack vectors. Without a comprehensive set of tools to mitigate those threats your mission-critical web-properties remain at risk.
This on-demand webinar looks at how to address this with a consolidated cloud-based platform approach.
Watch now to learn more about:
- Most frequent attacks mitigated by Cloudflare
- Brute force account takeover and its surge globally
- DDoS attacks vs. application attacks: commonalities and differences
- Parts played by both bad bots and verified bots
- What is a modern place of API traffic - and ways of attacking it.
Provided by Cloudflare
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Why veterans can excel in data centers – and could help the IT sector address its skill shortages
In-depth Ex-military workers can bring software and hardware to civilian roles
By John Loeppky
-
LaunchDarkly to "double down" on observability with Highlight acquisition
News Highlight's observability tools will be integrated into LaunchDarkly's Guarded Releases software deployment service
By Daniel Todd
-
Edge devices are now your weakest link: VPNs, firewalls, and routers were the leading source of initial compromise in 30% of incidents last year – here’s why
News Compromised network edge devices have rapidly emerged as one of the biggest attack points for small and medium businesses.
By Bobby Hellard
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott
-
Cisco claims new smart switches provide next-level perimeter defense
News Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
By Solomon Klappholz
-
Five Eyes cyber agencies issue guidance on edge device vulnerabilities
News Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.
By Emma Woollacott
-
The state of cybersecurity in Europe
Cyber professionals across Europe reveal which industries have been worst hit by an increasingly hostile threat landscape and what they are doing to stay protected
By ITPro
-
The state of cybersecurity in the Middle East
Cloudflare’s annual deep dive into the forces shaping the cyber landscape in the Middle East reveals the sectors and vectors that threat actors are focusing on
By ITPro
-
T-Mobile security chief insists its defenses stood up to attacks linked to Salt Typhoon
News No T-Mobile customers or services were affected after its security teams detected suspicious activity on their routers
By Solomon Klappholz
-
Securing your network in every direction with zero trust
Whitepaper Webinar on the evolution of network security
By ITPro