Are you prepared for the next attack? The state of application security in 2024
The latest application and API security threat research


Web applications are central to modern life. For governments, they are an important channel to communicate information to the public and provide essential services. For businesses, they serve as a source of revenue, efficiency, and customer insights,
Take a close look at the most important trends shaping the web application and API threat landscape today, including vulnerability exploitation, DDoS attacks, bot traffic, and third-party supply chain risk.
Join Cloudflare Application Security experts Daniele Molteni, Product Manager and Catherine Newcomb, Product Marketing Manager, for a discussion on the latest application and API security threat research sourced from Cloudflare’s global network, including:
- Shifts in blocked web applications and API traffic
- The growth and increased complexity of DDoS attacks
- The weaponization of vulnerabilities at breakneck speed
- The growing risk of shadow APIs
- Risks associated with third-party components such as scripts, outbound connections, and cookies
Watch now.
Provided by Cloudflare
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
"Thinly spread": Questions raised over UK government’s latest cyber funding scheme
The funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag
By George Fitzmaurice
-
The state of cybersecurity in Europe
Cyber professionals across Europe reveal which industries have been worst hit by an increasingly hostile threat landscape and what they are doing to stay protected
By ITPro
-
The state of cybersecurity in the Middle East
Cloudflare’s annual deep dive into the forces shaping the cyber landscape in the Middle East reveals the sectors and vectors that threat actors are focusing on
By ITPro
-
Modern enterprise cybersecurity
whitepaper Cultivating resilience with reduced detection and response times
By ITPro
-
IDC InfoBrief: How CIOs can achieve the promised benefits of sustainability
whitepaper CIOs are facing two conflicting strategic imperatives
By ITPro
-
The complete guide to the NIST cybersecurity framework
Whitepaper Find out how the NIST Cybersecurity framework is evolving
By ITPro
-
NIS 2 compliance with WatchGuard Technologies
Webinar WatchGuard whitepaper - Demystifying NIS 2 requirements
By ITPro
-
Chicanes and tunnels
Webinar The race to securely connect remote users
By ITPro