Web application breaches doubled in 2020 but legacy rule based WAFs cannot keep up with the speed at which today’s cloud-native applications evolve. These first generation approaches rely on threat signatures and complex manual rule tuning.