Securing today for the quantum future: WARP client now supports post-quantum cryptography (PQC)
2025-09-24
To prepare for a future where powerful quantum computers come online, we've upgraded our WARP client with post-quantum cryptography....
2025-09-24
To prepare for a future where powerful quantum computers come online, we've upgraded our WARP client with post-quantum cryptography....
2025-09-23
Cloudflare Confidence Scorecards are now live in the Application Library. Get transparent risk ratings for SaaS and Gen-AI apps....
2025-09-18
Tired of IP Lists? Securely connect private networks to any app by its hostname, not its IP address. This routing is now built into Cloudflare Tunnel and is free for all Cloudflare One customers....
2025-08-26
Cloudflare will provide confidence scores within our application library for Gen AI applications, allowing customers to assess their risk for employees using shadow IT. ...
2025-08-26
This guide provides best practices for Security and IT leaders to securely adopt generative AI using Cloudflare’s SASE architecture as part of a strategy for AI Security Posture Management (AI-SPM)....
2025-07-07
Cloudflare's SASE platform now offers egress policies by hostname, domain, content category, and application in open beta....
2025-06-19
We read NIST’s new guidance on “Implementing a Zero-Trust Architecture” so that you don’t have to. Read this to get the key points on the newly-released NIST Special Publication 1800-35. ...
2025-03-17
We’re thrilled to announce that organizations can now protect their sensitive corporate network traffic against quantum threats by tunneling it through Cloudflare’s Zero Trust platform....
2024-10-23
Access for Infrastructure, BastionZero’s integration into Cloudflare One, will enable organizations to apply Zero Trust controls to their servers, databases, Kubernetes clusters, and more. Today we’re announcing short-lived SSH access as the first available feature of this integration. ...
2024-07-09
The RADIUS protocol is commonly used to control administrative access to networking gear. Despite its importance, RADIUS hasn’t changed much in decades. We discuss an attack on RADIUS as a case study for why it’s important for legacy protocols to keep up with advancements in cryptography...