{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www.fraudlogix.com\/blog\/tag\/cybersecurity\/#CollectionPage","headline":"cybersecurity Tag","description":"","url":"https:\/\/www.fraudlogix.com\/blog\/tag\/cybersecurity\/","hasPart":[{"@type":"Article","@id":"https:\/\/www.fraudlogix.com\/blog\/ip-risk-scoring-waf-rules","headline":"How to Strengthen Your WAF with IP Risk Scoring: Stop Threats Before They Reach Your Application","url":"https:\/\/www.fraudlogix.com\/blog\/ip-risk-scoring-waf-rules","datePublished":"2026-03-12","dateModified":"2026-03-16","mainEntityOfPage":"https:\/\/www.fraudlogix.com\/blog\/ip-risk-scoring-waf-rules","author":{"@type":"Person","@id":"https:\/\/www.fraudlogix.com\/blog\/author\/jessica\/#Person","name":"jessica","url":"https:\/\/www.fraudlogix.com\/blog\/author\/jessica\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/3b2b6a041171574f44806fe399dae635?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b2b6a041171574f44806fe399dae635?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.fraudlogix.com\/wp-content\/uploads\/2026\/03\/fraudlogix-waf-featured-image-3.png","url":"https:\/\/www.fraudlogix.com\/wp-content\/uploads\/2026\/03\/fraudlogix-waf-featured-image-3.png","height":630,"width":1200},"keywords":["bot detection","cybersecurity","IP risk scoring","WAF"]}]}