Democratizing email security: protecting individuals and businesses of all sizes from phishing and malware attacks
March 14, 2022 12:59PM
Once the acquisition of Area 1 closes, we plan to give all paid self-serve plans access to their email security technology at no additional charge...
Continue reading »
Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception
March 18, 2019 5:47PM
Speed & Reliability
The practice of HTTPS interception continues to be commonplace on the Internet. This blog post discusses types of monster-in-the-middle devices and software, and how to detect them....
Website Security Myths
September 08, 2018 4:00PM
Some conversations are easy; some are difficult. Some are harmonious and some are laborious. But when it comes to website security, the conversation is confusing. Every organisation agrees, in theory, that their websites need to be secure....
When the Attackers Name Malware After You, You Know You're Doing Something Right
February 14, 2013 1:29AM
I'm Under Attack Mode
CloudFlare's I'm Under Attack Mode (IUAM) is elegantly simple. When a site is under an application layer (Layer 7) distributed denial of service (DDoS) attack, the mode will return a challenge page to a visitor....
Thoughts on Abuse
July 13, 2012 10:47PM
One of the behind the scenes topics we think about a lot at CloudFlare is how to handle abuse of our network. I realized that we hadn't exposed our thoughts on this clearly enough. In the next few days, we'll be making some minor updates to our Terms of Service....
May 03, 2012 2:00PM
CloudFlare & OpenDNS Work Together to Help the Web
Several years ago, some suspected cyber criminals on the Internet wrote a family of malware dubbed DNSChanger. About a year ago, law enforcement tracked down the suspected cyber criminals behind this malware....