{"id":34938,"date":"2024-08-01T07:00:00","date_gmt":"2024-08-01T14:00:00","guid":{"rendered":"https:\/\/cloudinary.com\/blog\/?p=34938"},"modified":"2025-11-05T13:55:48","modified_gmt":"2025-11-05T21:55:48","slug":"media-security-on-the-web","status":"publish","type":"post","link":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web","title":{"rendered":"Media Security on the Web"},"content":{"rendered":"\n<p>Sharing visual media is essential to the success of your business. With the rise of digital content consumption, ensuring that your media is secure, optimized, and properly managed can protect your brand&#8217;s reputation and financial stability. Cloudinary, a comprehensive media management solution, offers features to address these security concerns.<\/p>\n\n\n\n<p>This blog post addresses three main concerns regarding media security \u2013 billing, reputation and IP security, and confidentiality and data privacy \u2013 and how Cloudinary can help mitigate these issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Billing<\/h2>\n\n\n\n<p>Cloudinary developed metrics to understand the value of its service, which translates to the monthly bill. We want to ensure that it is your business that reaps this value, so the bills are appropriate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Bandwidth\/Impressions Abuse<\/h3>\n\n\n\n<p>Cloudinary <a href=\"https:\/\/cloudinary.com\/documentation\/programmable_media_asset_usage_data#delivery_reports\">Delivery Report<\/a> helps you identify suspected bandwidth abuse. You can then go ahead and protect your bandwidth consumption using <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#allowlisting_or_blocklisting_access_to_your_product_environment_39_s_assets_premium_feature\">Cloudinary Access Control List (ACL)<\/a> to set a flexible mix of deny and allow rules for clients\u2019 User-Agents, IP addresses, Referrers, and Countries. This feature is available through <a href=\"https:\/\/support.cloudinary.com\/hc\/en-us\/requests\/new\">Cloudinary Support<\/a>.<\/p>\n\n\n\n<p>Another option for bandwidth abuse is through Cloudinary\u2019s <a href=\"https:\/\/cloudinary.com\/documentation\/fetch_remote_images#fetch_and_deliver_remote_files\">remote assets fetching<\/a> feature, which allows you to enjoy optimization and delivery of files hosted outside of Cloudinary. Make sure you <a href=\"https:\/\/cloudinary.com\/documentation\/fetch_remote_images#restricting_the_allowed_fetch_domains\">enable it for trusted domains only<\/a> so it won\u2019t be abused.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Storage Abuse<\/h3>\n\n\n\n<p>User-generated content (UGC) is great for increasing user engagement, but to avoid abusing it, you should carefully define an upload preset:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/cloudinary.com\/documentation\/dam_admin_upload_presets#upload_control\"><strong>Allowed formats<\/strong><\/a>. Specify the media formats relevant to the expected media.<\/li>\n\n\n\n<li><a href=\"https:\/\/cloudinary.com\/documentation\/dam_admin_upload_presets#upload_manipulations\"><strong>Incoming transformations<\/strong><\/a>. Apply maximum resolution (e.g., <a href=\"https:\/\/cloudinary.com\/documentation\/transformation_reference#c_limit\">c_limit,w_3000<\/a> will scale down any media wider than 3,000 pixels) and <a href=\"https:\/\/cloudinary.com\/documentation\/transformation_reference#f_supported_format\">advanced format<\/a> (e.g., JPEG XL for images or WEBM for videos) for incoming media.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Add-ons Abuse<\/h3>\n\n\n\n<p>By default, you must sign all media files <a href=\"https:\/\/cloudinary.com\/documentation\/manage_and_analyze_addons#ai_media_processing\">delivered with add-on transformations<\/a>. If you allow unsigned add-on transformations, then users can use them as they wish.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Transformations Abuse<\/h3>\n\n\n\n<p>Similar to add-ons, transformations can be consumed when delivering. Transformations are much cheaper than add-ons and aren\u2019t restricted by default. Cloudinary has a feature that allows <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#strict_transformations\">restricting transformations by signature<\/a>, like add-ons. However, it\u2019s mostly used for reputation management (see below); it\u2019s uncommon to see cost-related abuse of transformations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Reputation and IP Security<\/h2>\n\n\n\n<p>Once you publish an asset on the web, it can be used by anyone in any proper and improper way. However, there are measures you can take to protect your digital assets even after they\u2019re available globally.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Image Provenance and Authenticity: C2PA<\/h3>\n\n\n\n<p><a href=\"https:\/\/cloudinary.com\/blog\/c2pa-standard-implementation\">C2PA<\/a> is an emerging standard to combat fake visuals. You can now prove to your audience (and yourself) the exact processing of a given image from photoshoot through editing and post-production to delivery. When using compliant cameras and software, the image will contain a cryptographical log of actions that can be verified.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Watermarking<\/h3>\n\n\n\n<p>Watermarking is a traditional way to prove the authenticity and ownership of documents. It is being used in e-commerce, art, news media, and more. Here are several options:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tiled watermark<\/strong>.&nbsp;Tile (<a href=\"https:\/\/cloudinary.com\/documentation\/transformation_reference#fl_tiled\">fl_tiled<\/a>) your watermark with transparency (<a href=\"https:\/\/cloudinary.com\/documentation\/transformation_reference#o_opacity\">o_10<\/a>) all over the protected image. <\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img width=\"400\" height=\"400\" data-public-id=\"Web_Assets\/blog\/blog-media-security-on-the-web-1\/blog-media-security-on-the-web-1.png\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/w_400,h_400,c_fill,g_auto\/f_auto,q_auto\/v1722468013\/Web_Assets\/blog\/blog-media-security-on-the-web-1\/blog-media-security-on-the-web-1.png?_i=AA\" alt=\"cloudinary watermark tiled on an image of a man sitting on bench\" class=\"wp-post-34938 wp-image-34939\" data-format=\"png\" data-transformations=\"f_auto,q_auto\" data-version=\"1722468013\" data-seo=\"1\" srcset=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468013\/Web_Assets\/blog\/blog-media-security-on-the-web-1\/blog-media-security-on-the-web-1.png?_i=AA 400w, https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468013\/Web_Assets\/blog\/blog-media-security-on-the-web-1\/blog-media-security-on-the-web-1.png?_i=AA 150w, https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468013\/Web_Assets\/blog\/blog-media-security-on-the-web-1\/blog-media-security-on-the-web-1.png?_i=AA 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/cloudinary-marketing-res.cloudinary.com\/f_auto,fl_tiled,l_blog-Media_Security_Waterstamp,o_10,q_auto,w_100\/samples\/man-on-a-street.jpg\">https:\/\/cloudinary-marketing-res.cloudinary.com\/f_auto,fl_tiled,l_blog-Media_Security_Waterstamp,o_10,q_auto,w_100\/samples\/man-on-a-street.jpg<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tainted watermark. <\/strong>Use the <a href=\"https:\/\/cloudinary.com\/documentation\/layers#smart_anti_removal\">anti-removal effect<\/a> to randomly distort the overlay, making it difficult to remove your watermark.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img width=\"400\" height=\"400\" data-public-id=\"Web_Assets\/blog\/blog-media-security-on-the-web-2\/blog-media-security-on-the-web-2.png\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/w_400,h_400,c_fill,g_auto\/f_auto,q_auto\/v1722468011\/Web_Assets\/blog\/blog-media-security-on-the-web-2\/blog-media-security-on-the-web-2.png?_i=AA\" alt=\"large cloudinary watermark on an image of a man sitting on bench\" class=\"wp-post-34938 wp-image-34940\" data-format=\"png\" data-transformations=\"f_auto,q_auto\" data-version=\"1722468011\" data-seo=\"1\" srcset=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468011\/Web_Assets\/blog\/blog-media-security-on-the-web-2\/blog-media-security-on-the-web-2.png?_i=AA 400w, https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468011\/Web_Assets\/blog\/blog-media-security-on-the-web-2\/blog-media-security-on-the-web-2.png?_i=AA 150w, https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468011\/Web_Assets\/blog\/blog-media-security-on-the-web-2\/blog-media-security-on-the-web-2.png?_i=AA 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/cloudinary-marketing-res.cloudinary.com\/e_anti_removal:111,f_auto,l_blog-Media_Security_Waterstamp,o_40,q_auto,w_600\/samples\/man-on-a-street.jpg\">https:\/\/cloudinary-marketing-res.cloudinary.com\/e_anti_removal:111,f_auto,l_blog-Media_Security_Waterstamp,o_40,q_auto,w_600\/samples\/man-on-a-street.jpg<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hidden watermark<\/strong>. Blend in an (almost) transparent blue overlay.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img width=\"400\" height=\"400\" data-public-id=\"Web_Assets\/blog\/blog-media-security-on-the-web-3\/blog-media-security-on-the-web-3.png\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/w_400,h_400,c_fill,g_auto\/f_auto,q_auto\/v1722468008\/Web_Assets\/blog\/blog-media-security-on-the-web-3\/blog-media-security-on-the-web-3.png?_i=AA\" alt=\"hidden cloudinary watermark tiled on an image of a man sitting on bench\" class=\"wp-post-34938 wp-image-34941\" data-format=\"png\" data-transformations=\"f_auto,q_auto\" data-version=\"1722468008\" data-seo=\"1\" srcset=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468008\/Web_Assets\/blog\/blog-media-security-on-the-web-3\/blog-media-security-on-the-web-3.png?_i=AA 400w, https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468008\/Web_Assets\/blog\/blog-media-security-on-the-web-3\/blog-media-security-on-the-web-3.png?_i=AA 150w, https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468008\/Web_Assets\/blog\/blog-media-security-on-the-web-3\/blog-media-security-on-the-web-3.png?_i=AA 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/cloudinary-marketing-res.cloudinary.com\/e_screen,f_auto,fl_tiled,l_blog-Media_Security_Waterstamp,o_8,q_auto,w_100\/samples\/man-on-a-street.jpg\">https:\/\/cloudinary-marketing-res.cloudinary.com\/e_screen,f_auto,fl_tiled,l_blog-Media_Security_Waterstamp,o_8,q_auto,w_100\/samples\/man-on-a-street.jpg<\/a><\/p>\n\n\n\n<p>You can reveal it by removing the green and red, and desaturating the remaining pixels.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img width=\"400\" height=\"400\" data-public-id=\"Web_Assets\/blog\/blog-media-security-on-the-web-4\/blog-media-security-on-the-web-4.png\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/w_400,h_400,c_fill,g_auto\/f_auto,q_auto\/v1722468006\/Web_Assets\/blog\/blog-media-security-on-the-web-4\/blog-media-security-on-the-web-4.png?_i=AA\" alt=\"saturated image of a man sitting on bench\" class=\"wp-post-34938 wp-image-34942\" data-format=\"png\" data-transformations=\"f_auto,q_auto\" data-version=\"1722468006\" data-seo=\"1\" srcset=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468006\/Web_Assets\/blog\/blog-media-security-on-the-web-4\/blog-media-security-on-the-web-4.png?_i=AA 400w, https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468006\/Web_Assets\/blog\/blog-media-security-on-the-web-4\/blog-media-security-on-the-web-4.png?_i=AA 150w, https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1722468006\/Web_Assets\/blog\/blog-media-security-on-the-web-4\/blog-media-security-on-the-web-4.png?_i=AA 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/cloudinary-marketing-res.cloudinary.com\/e_screen,f_auto,fl_tiled,l_blog-Media_Security_Waterstamp,o_8,q_auto,w_100\/e_green:-100\/e_red:-100\/e_saturation:-1000\/samples\/man-on-a-street.jpg\">https:\/\/cloudinary-marketing-res.cloudinary.com\/e_screen,f_auto,fl_tiled,l_blog-Media_Security_Waterstamp,o_8,q_auto,w_100\/e_green:-100\/e_red:-100\/e_saturation:-1000\/samples\/man-on-a-street.jpg<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Prevent Requests for Unwatermarked Assets or Full-Res Assets<\/h3>\n\n\n\n<p>To achieve this, we need we can choose between two approaches:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Upload assets as <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#authenticated_media_assets\">authenticated<\/a>, so each request to the original or derivatives must be signed using the API secret.\u00a0<\/li>\n\n\n\n<li>Upload assets as private and apply Strict Transformations.\n<ol class=\"wp-block-list\">\n<li>Upload assets as <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#private_media_assets\">private<\/a> so the original asset can\u2019t be requested (unless using the API secret to sign the request).<\/li>\n\n\n\n<li>Prevent unapproved transformations using Cloudinary\u2019s <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#strict_transformations\">strict transformations<\/a> mode. Note that this is an environment-level flag and limits the way you can use on-the-fly transformations for all assets in your environment.<\/li>\n\n\n\n<li>You can specify <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#define_allowed_transformations\">allow lists<\/a> for certain transformations or referrers.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<p>With both approaches you can define <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#cookie_based_access_premium_feature\">session-based cookies<\/a>, that bypass the restrictions.<\/p>\n\n\n\n<p>To learn more about this method to protect your watermarks, read our <a href=\"https:\/\/cloudinary.com\/blog\/how_to_quickly_build_a_stock_photo_site_using_cloudinary\">blog post<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">User-Generated Content (UGC) Moderation<\/h3>\n\n\n\n<p>User-generated content is essential to building engagement, but you should ensure all uploaded media is legitimate. Leverage Cloudinary\u2019s state-of-the-art AI moderation to make sure you comply with state laws and corporate guidelines for suitable content delivered from your company\u2019s account.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The <a href=\"https:\/\/cloudinary.com\/addons#adv_ocr\">OCR text extraction<\/a> add-on validates proper language and\/or blur text for privacy purposes.<\/li>\n\n\n\n<li><a href=\"https:\/\/cloudinary.com\/addons\">Google and Amazon AI<\/a> add-ons detect improper visual content in uploaded images and videos, according to specific categories (e.g., alcohol, weapons, etc.).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Mass Restriction With Access Control List (ACL)<\/h3>\n\n\n\n<p>This method was <a href=\"https:\/\/docs.google.com\/document\/d\/1vXBrelw-sFSW7pTjBH1X6cGMt_M-i6A_oAE7sCXXcng\/edit#heading=h.ljg81h8z2zfe\">already mentioned<\/a> to prevent bandwidth abuse. It can also be useful when certain countries or bots repeatedly violate your brand guidelines or IP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Confidentiality and Data Privacy<\/h2>\n\n\n\n<p>Whether it\u2019s your future plans or your users\u2019 private data, you want to control what you share and with whom.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Protecting Original Bytes and Metadata<\/h3>\n\n\n\n<p>Images and videos can be uploaded as <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#private_media_assets\">private<\/a> to restrict access to the original unoptimized asset and its full metadata (EXIF), which can include PII or your business&#8217;s internal metadata. You can create a signature (time-limited or permanent) and share the original with a signed URL.&nbsp;<\/p>\n\n\n\n<p>To protect derivatives of a private asset, enable strict transformations on your environment. See the previous section <a href=\"https:\/\/docs.google.com\/document\/d\/1vXBrelw-sFSW7pTjBH1X6cGMt_M-i6A_oAE7sCXXcng\/edit#heading=h.6k4mqxiuzt39\">Prevent Requests for Unwatermarked Assets<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Permitting Access to Eligible Users or Time Periods<\/h3>\n\n\n\n<p>Some assets can be shared only with the intended audience, or under embargo\/expiry limitations. This use case is supported with <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#access_controlled_media_assets\">restricted assets<\/a>, where the assets can be served only with a token or cookie (premium feature) that was generated by your application according to the required criteria of time, folder, transformation, and more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>In this blog post, we covered the common security risks that Cloudinary\u2019s customers are facing and how Cloudinary\u2019s features can mitigate those risks while ensuring your visual media is delivered flawlessly. Whether it\u2019s ensuring content authenticity or moderating UGC, Cloudinary can help you practice better media security on the web. <a href=\"https:\/\/cloudinary.com\/\">Contact us today<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sharing visual media is essential to the success of your business. With the rise of digital content consumption, ensuring that your media is secure, optimized, and properly managed can protect your brand&#8217;s reputation and financial stability. Cloudinary, a comprehensive media management solution, offers features to address these security concerns. This blog post addresses three main [&hellip;]<\/p>\n","protected":false},"author":87,"featured_media":34944,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"tags":[165,264,300],"class_list":["post-34938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-image-transformation","tag-security","tag-user-generated-content"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Media Security on the Web | Cloudinary<\/title>\n<meta name=\"description\" content=\"Here are 3 common media security risks and how Cloudinary\u2019s features can mitigate those risks while ensuring your visual media is delivered flawlessly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Media Security on the Web\" \/>\n<meta property=\"og:description\" content=\"Here are 3 common media security risks and how Cloudinary\u2019s features can mitigate those risks while ensuring your visual media is delivered flawlessly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web\" \/>\n<meta property=\"og:site_name\" content=\"Cloudinary Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-01T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-05T21:55:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1100\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"melindapham\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#article\",\"isPartOf\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web\"},\"author\":{\"name\":\"melindapham\",\"@id\":\"https:\/\/cloudinary.com\/blog\/#\/schema\/person\/0d5ad601e4c3b5be89245dfb14be42d9\"},\"headline\":\"Media Security on the Web\",\"datePublished\":\"2024-08-01T14:00:00+00:00\",\"dateModified\":\"2025-11-05T21:55:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web\"},\"wordCount\":1112,\"publisher\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#primaryimage\"},\"thumbnailUrl\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA\",\"keywords\":[\"Image Transformation\",\"Security\",\"User-Generated Content\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\/\/cloudinary.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web\",\"url\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web\",\"name\":\"Media Security on the Web | Cloudinary\",\"isPartOf\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#primaryimage\"},\"thumbnailUrl\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA\",\"datePublished\":\"2024-08-01T14:00:00+00:00\",\"dateModified\":\"2025-11-05T21:55:48+00:00\",\"description\":\"Here are 3 common media security risks and how Cloudinary\u2019s features can mitigate those risks while ensuring your visual media is delivered flawlessly.\",\"breadcrumb\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#primaryimage\",\"url\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA\",\"contentUrl\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA\",\"width\":2000,\"height\":1100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloudinary.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Media Security on the Web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloudinary.com\/blog\/#website\",\"url\":\"https:\/\/cloudinary.com\/blog\/\",\"name\":\"Cloudinary Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloudinary.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cloudinary.com\/blog\/#organization\",\"name\":\"Cloudinary Blog\",\"url\":\"https:\/\/cloudinary.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudinary.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649718331\/Web_Assets\/blog\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877.png?_i=AA\",\"contentUrl\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649718331\/Web_Assets\/blog\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877.png?_i=AA\",\"width\":312,\"height\":60,\"caption\":\"Cloudinary Blog\"},\"image\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cloudinary.com\/blog\/#\/schema\/person\/0d5ad601e4c3b5be89245dfb14be42d9\",\"name\":\"melindapham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudinary.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e6f989fa97fe94be61596259d8629c3df65aec4c7da5c0000f90d810f313d4f4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e6f989fa97fe94be61596259d8629c3df65aec4c7da5c0000f90d810f313d4f4?s=96&d=mm&r=g\",\"caption\":\"melindapham\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Media Security on the Web | Cloudinary","description":"Here are 3 common media security risks and how Cloudinary\u2019s features can mitigate those risks while ensuring your visual media is delivered flawlessly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web","og_locale":"en_US","og_type":"article","og_title":"Media Security on the Web","og_description":"Here are 3 common media security risks and how Cloudinary\u2019s features can mitigate those risks while ensuring your visual media is delivered flawlessly.","og_url":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web","og_site_name":"Cloudinary Blog","article_published_time":"2024-08-01T14:00:00+00:00","article_modified_time":"2025-11-05T21:55:48+00:00","og_image":[{"width":2000,"height":1100,"url":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA","type":"image\/jpeg"}],"author":"melindapham","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#article","isPartOf":{"@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web"},"author":{"name":"melindapham","@id":"https:\/\/cloudinary.com\/blog\/#\/schema\/person\/0d5ad601e4c3b5be89245dfb14be42d9"},"headline":"Media Security on the Web","datePublished":"2024-08-01T14:00:00+00:00","dateModified":"2025-11-05T21:55:48+00:00","mainEntityOfPage":{"@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web"},"wordCount":1112,"publisher":{"@id":"https:\/\/cloudinary.com\/blog\/#organization"},"image":{"@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA","keywords":["Image Transformation","Security","User-Generated Content"],"inLanguage":"en-US","copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/cloudinary.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web","url":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web","name":"Media Security on the Web | Cloudinary","isPartOf":{"@id":"https:\/\/cloudinary.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#primaryimage"},"image":{"@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA","datePublished":"2024-08-01T14:00:00+00:00","dateModified":"2025-11-05T21:55:48+00:00","description":"Here are 3 common media security risks and how Cloudinary\u2019s features can mitigate those risks while ensuring your visual media is delivered flawlessly.","breadcrumb":{"@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudinary.com\/blog\/media-security-on-the-web"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#primaryimage","url":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA","contentUrl":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA","width":2000,"height":1100},{"@type":"BreadcrumbList","@id":"https:\/\/cloudinary.com\/blog\/media-security-on-the-web#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudinary.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Media Security on the Web"}]},{"@type":"WebSite","@id":"https:\/\/cloudinary.com\/blog\/#website","url":"https:\/\/cloudinary.com\/blog\/","name":"Cloudinary Blog","description":"","publisher":{"@id":"https:\/\/cloudinary.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudinary.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cloudinary.com\/blog\/#organization","name":"Cloudinary Blog","url":"https:\/\/cloudinary.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudinary.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649718331\/Web_Assets\/blog\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877.png?_i=AA","contentUrl":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649718331\/Web_Assets\/blog\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877.png?_i=AA","width":312,"height":60,"caption":"Cloudinary Blog"},"image":{"@id":"https:\/\/cloudinary.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cloudinary.com\/blog\/#\/schema\/person\/0d5ad601e4c3b5be89245dfb14be42d9","name":"melindapham","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudinary.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e6f989fa97fe94be61596259d8629c3df65aec4c7da5c0000f90d810f313d4f4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e6f989fa97fe94be61596259d8629c3df65aec4c7da5c0000f90d810f313d4f4?s=96&d=mm&r=g","caption":"melindapham"}}]}},"jetpack_featured_media_url":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1719957387\/media_security-blog\/media_security-blog.jpg?_i=AA","_links":{"self":[{"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/posts\/34938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/users\/87"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/comments?post=34938"}],"version-history":[{"count":3,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/posts\/34938\/revisions"}],"predecessor-version":[{"id":39080,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/posts\/34938\/revisions\/39080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/media\/34944"}],"wp:attachment":[{"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/media?parent=34938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/categories?post=34938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/tags?post=34938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}