The (hardware) key to making phishing defense seamless with Cloudflare Zero Trust and Yubico
September 29, 2022
Announcing a new collaboration with Yubico, to remove any barriers for organizations of any size to deploying hardware security keys....
September 29, 2022
Announcing a new collaboration with Yubico, to remove any barriers for organizations of any size to deploying hardware security keys....
September 29, 2022
Role Based Access Controls are now available for every plan!...
September 29, 2022
Starting today, Free, Pro and Business plans include Rate Limiting rules without additional charges....
September 29, 2022
Adopting a phishing resistant second factor, like a YubiKey with FIDO2, is the number one way to prevent phishing attacks. Cloudflare has used phishing resistant second factors only since February 2021, and these were the steps we took to accomplish that....
September 28, 2022
Any website can use a simple API to replace CAPTCHAs with our invisible alternative, whether they’re on the Cloudflare network or not....
September 28, 2022
Introducing Privacy Edge – a collection of products that make it easier for site owners and developers to protect their users’ privacy by default. ...
September 27, 2022
Forester has recognised Cloudflare as a Leader in The Forrester Wave™: Web Application Firewalls, Q3 2022 report. The report evaluated 12 Web Application Firewall (WAF) providers on 24 criteria across current offering, strategy and market presence....
September 27, 2022
Origin Rules is a dedicated product for ‘where does this traffic go where it leaves Cloudflare.’ Customers are able to match on an HTTP request using filters and override the host, port, SNI, and the origin a request resolves to....
September 26, 2022
We’ve been defending customers from Internet of Things botnets for years now, and it’s time to turn the tides: we’re bringing the same security behind our Zero Trust platform to IoT...
September 23, 2022
Nobody likes CAPTCHAs. Now, with iOS 16 on iPhones, a small enabled toggle can make them disappear while improving privacy on your device. Here’s how to check if it’s “on” and try it out...
September 22, 2022
API Shield customers can save, update, and monitor the performance of API endpoints...
September 20, 2022
Cloudflare started using Area 1 in 2020 and proceeded with acquiring the company in 2022. We were most impressed how phishing, responsible for 90+% of cyberattacks, basically became a non-issue overnight when we deployed Area 1. But our vision is much bigger than preventing phish...
September 19, 2022
Cloudflare’s threat operations and research team, Cloudforce One, is now open for business and has begun conducting threat briefings. Join our webinar on “YackingYeti: How a Russian threat group targets Ukraine—and the world”, scheduled for October 12, to learn more...
September 06, 2022
Gartner has recognised Cloudflare as a Leader in the 2022 "Gartner® Magic Quadrant™ for Web Application and API Protection (WAAP)" report that evaluated 11 vendors for their ‘ability to execute’ and ‘completeness of vision’...
August 30, 2022
Today we are excited to announce thresholds for our Security Event Alerts: a new and improved way of detecting anomalous spikes of security events on your Internet properties. By introducing a threshold, we are able to make alerts more accurate and only notify you when it truly m...
August 11, 2022
In 2022, cybersecurity, more than ever, is a must-have for those who don’t want to take chances on getting caught in a cyberattack with difficult to deal with consequences. Here’s a reading list what you need to know about attacks that is also a guide on how to be protected...
August 09, 2022
Yesterday, August 8, 2022, Twilio shared that they’d been compromised by a targeted phishing attack. Around the same time as Twilio was attacked, we saw an attack with very similar characteristics also targeting Cloudflare’s employees...
August 06, 2022
We’re announcing two major improvements to our 1.1.1.1 + WARP apps...
July 05, 2022
In this post we go over improvements to script status, metadata and categorization....
June 29, 2022
Learn how to patch Linux security vulnerabilities without rebooting the hardware and how to tighten the security of your Linux operating system with eBPF Linux Security Module...