
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 09 Apr 2026 07:20:41 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Translating risk insights into actionable protection: leveling up security posture with Cloudflare and Mastercard]]></title>
            <link>https://blog.cloudflare.com/attack-surface-intelligence/</link>
            <pubDate>Tue, 10 Mar 2026 05:05:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare will be integrating Mastercard’s RiskRecon attack surface intelligence capabilities to help you eliminate Internet-facing blind spots while continuously monitoring and closing security gaps. ]]></description>
            <content:encoded><![CDATA[ <p>Every new domain, application, website, or API endpoint increases an organization's attack surface. For many teams, the speed of innovation and deployment outpaces their ability to catalog and protect these assets, often resulting in a "target-rich, resource-poor" environment where unmanaged infrastructure becomes an easy entry point for attackers.</p><p>Replacing manual, point-in-time audits with automated security posture visibility is critical to growing your Internet presence safely. That’s why we are happy to announce a planned integration that will enable the continuous discovery, monitoring and remediation of Internet-facing blind spots directly in the Cloudflare dashboard: Mastercard’s RiskRecon attack surface intelligence capabilities.</p><p>Information Security practitioners in pay-as-you-go and Enterprise accounts will be able to preview the integration in the third quarter of 2026.</p>
    <div>
      <h3>Attack surface intelligence can spot security gaps before attackers do</h3>
      <a href="#attack-surface-intelligence-can-spot-security-gaps-before-attackers-do">
        
      </a>
    </div>
    <p>Mastercard’s RiskRecon attack surface intelligence identifies and prioritizes external vulnerabilities by mapping an organization's entire internet footprint using only publicly accessible data. As an outside-in scanner, the solution can be deployed instantly to uncover "shadow IT," forgotten subdomains, and unauthorized cloud servers that internal, credentialed scans often miss. By seeing what an attacker sees in real time, security teams can proactively close security gaps before they can be exploited.</p><p>But what security gaps are attackers typically looking to exploit? In a <a href="https://www.riskrecon.com/report-six-lessons-from-10-years-of-ransomware-attacks"><u>2025 study</u></a> of 15,896 organizations that had experienced security breaches, Mastercard found that unpatched software, exposed services (e.g. databases, remote administration), weak application security (e.g. missing authentication) and outdated web encryption were frequent hallmarks, as seen in the graph below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70o4e4XoPHJN1x5OpeNP9x/f6a9f3854368a7f83eccad14412a89a6/image2.png" />
          </figure><p>The same study also found that organizations with significant cybersecurity posture gaps in these areas were 5.3x more likely to be hit by a ransomware attack, and 3.6x more likely to suffer a data breach compared to companies that maintain good cybersecurity hygiene.</p>
    <div>
      <h3>Why Cloudflare and Mastercard are partnering</h3>
      <a href="#why-cloudflare-and-mastercard-are-partnering">
        
      </a>
    </div>
    <p>This partnership combines Mastercard’s attack surface intelligence—which identifies security gaps—with Cloudflare’s ability to fix them. Organizations can use Mastercard’s data to find shadow assets, such as forgotten domains or unprotected cloud instances, and secure them by routing traffic through Cloudflare’s proxy. This allows for the immediate deployment of security controls without changing the underlying website or application.</p><p>Based on a sample of approximately 388,000 organizations spanning over 18 million systems, Mastercard’s attack surface intelligence shows that systems using Cloudflare as a proxy have significantly better security hygiene than those that do not:</p><ul><li><p><b>Software Patching:</b> 53% fewer software vulnerabilities</p></li><li><p><b>Web Encryption:</b> 58% fewer SSL/TLS issues</p></li><li><p><b>System Reputation:</b> 98% fewer instances of malicious behavior (e.g. communicating with botnet command and control servers, hosting phishing sites).</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69JeczWmG5UioBEK2odUv/08cda631baac7a38422b31a82f36c0a2/image5.png" />
          </figure><p>The table below provides additional details on the security posture insights provided by Mastercard. These insights are generated by passively scanning publicly accessible hosts, web applications, and configurations. </p>
<table><thead>
  <tr>
    <th><span>Category</span></th>
    <th><span>Security Check</span></th>
    <th><span>Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>Software Patching</span></td>
    <td><span>Application Servers</span></td>
    <td><span>Unpatched application server software.</span></td>
  </tr>
  <tr>
    <td><span>OpenSSL</span></td>
    <td><span>Unpatched OpenSSL.</span></td>
  </tr>
  <tr>
    <td><span>CMS Patching</span></td>
    <td><span>Unpatched content management system software.</span></td>
  </tr>
  <tr>
    <td><span>Web Servers</span></td>
    <td><span>Unpatched webserver software.</span></td>
  </tr>
  <tr>
    <td><span>Application Security</span></td>
    <td><span>CMS Authentication</span></td>
    <td><span>Enumeration of content management system administration interfaces publicly exposed to the internet.</span></td>
  </tr>
  <tr>
    <td><span>High Value System Encryption</span></td>
    <td><span>Enumeration of systems that collect sensitive data that do not have encryption implemented.</span></td>
  </tr>
  <tr>
    <td><span>Malicious Code</span></td>
    <td><span>Enumeration of systems containing malicious code (Magecart).</span></td>
  </tr>
  <tr>
    <td><span>Web Encryption</span></td>
    <td><span>Certificate Expiration Date</span></td>
    <td><span>SSL certificate expired.</span></td>
  </tr>
  <tr>
    <td><span>Certificate Valid Date</span></td>
    <td><span>SSL certificate valid date not yet valid.</span></td>
  </tr>
  <tr>
    <td><span>Encryption Hash Algorithm</span></td>
    <td><span>Weak SSL encryption hash algorithm.</span></td>
  </tr>
  <tr>
    <td><span>Encryption Key Length</span></td>
    <td><span>Weak SSL encryption key length.</span></td>
  </tr>
  <tr>
    <td><span>Certificate Subject</span></td>
    <td><span>Invalid SSL certificate subject.</span></td>
  </tr>
  <tr>
    <td><span>Exposed Services / Network Filtering</span></td>
    <td><span>Unsafe Network Services</span></td>
    <td><span>Enumeration of unsafe network services running on the system such as databases (e.g. SQL Server, PostgreSQL) and remote access services (e.g. RDP, VNC).</span></td>
  </tr>
  <tr>
    <td><span>IoT Devices</span></td>
    <td><span>Enumeration of IoT devices such as printers, embedded system interfaces, etc.</span></td>
  </tr>
</tbody></table>
    <div>
      <h3>Comprehensive domain discovery, continuous posture visibility, and remediation</h3>
      <a href="#comprehensive-domain-discovery-continuous-posture-visibility-and-remediation">
        
      </a>
    </div>
    <p><a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Cloudflare Security Insights</u></a> in <a href="https://www.cloudflare.com/application-services/products/"><u>Cloudflare’s Application Security</u></a> suite currently identifies risks—such as DNS misconfigurations, weak web encryption, or inactive WAF rules—for any domain already proxied by Cloudflare. However, a significant security gap remains: you cannot protect domains you don’t know exist.</p><p>The integration with Mastercard will eliminate these blind spots. By continuously profiling the Internet footprint of over 12 million organizations, Mastercard identifies domains, hosts, and software stacks associated with your company, even if they aren't yet behind a Cloudflare proxy. This will allow Security Insights to surface shadow IT and unprotected hosts, enabling you to secure them with Cloudflare’s WAF and DDoS protection. </p><p>Visibility is only the first step; understanding the criticality of discovered assets is what allows security teams to prioritize findings. Each host is assigned a criticality level:</p><ul><li><p><b>High Criticality:</b> Assigned to hosts that collect sensitive data, require authentication, or run sensitive network services like database listeners or remote access.</p></li><li><p><b>Medium Criticality:</b> Assigned to hosts running brochure websites that are adjacent to high-criticality systems, such as those residing on the same class-C network.</p></li><li><p><b>Low Criticality:</b> Assigned to hosts running brochure websites that are not adjacent to any critical systems.</p></li></ul><p>Below is a fictitious example of an organization with many domains that they are unaware of. Of these discovered domains, only one is currently proxied by Cloudflare. Within Security Insights, you will be able to visualize this level of detail for shadow domains and hosts. </p>
<table><colgroup>
<col></col>
<col></col>
<col></col>
<col></col>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Domain</span></th>
    <th><span>Protected by Cloudflare</span></th>
    <th><span>Host (IP)</span></th>
    <th><span>Criticality</span></th>
    <th><span>Location</span></th>
    <th><span>Hosting Provider</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>search-engine.net</span></td>
    <td><span>Yes</span></td>
    <td><a href="http://portal.search-engine.net/"><span>portal.search-engine.net</span></a><span> (10.XXX.XX.5)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Springfield, United States</span></td>
    <td><span>Cloudflare</span></td>
  </tr>
  <tr>
    <td><span>zenith-industries.com</span></td>
    <td><span>No</span></td>
    <td><a href="http://vpn.zenith-industries.com/"><span>vpn.zenith-industries.com</span></a><span> (10.XXX.XXX.106)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Helsinki, Finland</span></td>
    <td><span>CloudNode-Services</span></td>
  </tr>
  <tr>
    <td><span>stratus-global.com</span></td>
    <td><span>No</span></td>
    <td><a href="http://store.stratus-global.com/"><span>store.stratus-global.com</span></a><span> (10.XXX.XXX.124)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Munich, Germany</span></td>
    <td><span>SwiftStream-Tech</span></td>
  </tr>
  <tr>
    <td><span>core-logic.cl</span></td>
    <td><span>No</span></td>
    <td><a href="http://extranet.core-logic.cl/"><span>extranet.core-logic.cl</span></a><span> (10.XXX.XXX.178)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Santiago, Chile</span></td>
    <td><span>SecureCanopy Ltd.</span></td>
  </tr>
  <tr>
    <td><span>vanguard-labs.com</span></td>
    <td><span>No</span></td>
    <td><a href="http://extranet.vanguard-labs.com/"><span>extranet.vanguard-labs.com</span></a><span> (10.XXX.XX.197)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Metropolis, United States</span></td>
    <td><span>GlobalSoft Systems</span></td>
  </tr>
  <tr>
    <td><span>fusion-id.com</span></td>
    <td><span>No</span></td>
    <td><a href="http://fusion-id.com/"><span>fusion-id.com</span></a><span> (10.XXX.XXX.146)</span></td>
    <td><span>HIGH</span></td>
    <td><span>Prague, Czechia</span></td>
    <td><span>EuroData-Hub</span></td>
  </tr>
  <tr>
    <td><span>norden-biotech.no</span></td>
    <td><span>No</span></td>
    <td><a href="http://store.norden-biotech.no/"><span>store.norden-biotech.no</span></a><span> (10.XXX.XX.124)</span></td>
    <td><span>MEDIUM</span></td>
    <td><span>Chicago, United States</span></td>
    <td><span>SwiftStream-Tech</span></td>
  </tr>
  <tr>
    <td><span>norden-biotech.se</span></td>
    <td><span>No</span></td>
    <td><a href="http://store.norden-biotech.se/"><span>store.norden-biotech.se</span></a><span> (10.XXX.XX.124)</span></td>
    <td><span>MEDIUM</span></td>
    <td><span>Chicago, United States</span></td>
    <td><span>SwiftStream-Tech</span></td>
  </tr>
</tbody></table><p><sup><i>Example of shadow domains and unprotected hosts associated with an organization</i></sup></p><p>Mastercard will also allow continuous visibility into the security posture of Internet-facing systems including in areas like software patching, exposed network services (e.g., databases, remote access) and application security (e.g., unauthenticated CMSes) — complementing <a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Cloudflare Security Insights</u></a>, as shown below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/T3ff3WNmedjbAO76X0fQr/d04a60dc4e1d7093832eec12f653e92e/image1.png" />
          </figure><p><sup><i>Security Insights dashboard with shadow domains, unproxied hosts, and posture findings</i></sup></p><p>These<b> </b>insights are only useful if they lead to action. Instead of just telling you that a domain or host is at risk, <a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Cloudflare Security Insights</u></a> will guide you to fixing them. Possible steps include enabling a Cloudflare proxy (and by extension DDoS and bot protection for shadow zones and hosts), enabling security controls (such as turning on the Web Application Firewall, or WAF) and enforcing stricter TLS encryption to mitigate the specific risks identified by the scan.</p>
    <div>
      <h3>What’s next: updated security insights dashboard</h3>
      <a href="#whats-next-updated-security-insights-dashboard">
        
      </a>
    </div>
    <p>We are currently working on integrating Mastercard’s RiskRecon attack surface intelligence into the <a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Cloudflare Security Insights</u></a> dashboard to provide immediate visibility into shadow domains, unprotected hosts and the posture gaps associated with them.</p><p>With an increasing volume of insights, our roadmap also includes risk scoring and building AI-assisted diagnosis paths. That will mean a dashboard that doesn't just show you an insight, but proposes additional relevant correlations (such as traffic to an unpatched host) and suggests the specific WAF rule or <a href="https://blog.cloudflare.com/api-abuse-detection/"><u>API Shield</u></a> configuration required to neutralize it.</p><p>We would love to have you <a href="https://www.cloudflare.com/lp/mastercard-defense-program/"><u>join the waitlist here</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Posture Management]]></category>
            <category><![CDATA[Security Posture]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[Risk Management]]></category>
            <guid isPermaLink="false">50TFdPHZwAQHUcskN0xNgX</guid>
            <dc:creator>Bashyam Anant</dc:creator>
            <dc:creator>Kelly White (Guest author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enhance your website's security with Cloudflare’s free security.txt generator]]></title>
            <link>https://blog.cloudflare.com/security-txt/</link>
            <pubDate>Sun, 06 Oct 2024 23:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s free security.txt generator lets users create and manage security.txt files. Enhance vulnerability disclosure, align with industry standards, and integrate into the dashboard. ]]></description>
            <content:encoded><![CDATA[ 
    <div>
      <h2>A story of security and simplicity</h2>
      <a href="#a-story-of-security-and-simplicity">
        
      </a>
    </div>
    <p>Meet Georgia, a diligent website administrator at a growing e-commerce company. Every day, Georgia juggles multiple tasks, from managing server uptime to ensuring customer data security. One morning, Georgia receives an email from a security researcher who discovered a potential vulnerability on the website. The researcher struggled to find the right contact information, leading to delays in reporting the issue. Georgia realizes the need for a standardized way to communicate with security researchers, ensuring that vulnerabilities are reported swiftly and efficiently. This is where security.txt comes in.</p>
    <div>
      <h2>Why security.txt matters</h2>
      <a href="#why-security-txt-matters">
        
      </a>
    </div>
    <p><a href="https://securitytxt.org/"><u>Security.txt</u></a> is becoming a widely adopted standard among security-conscious organizations. By providing a common location and format for vulnerability disclosure information, it helps bridge the gap between security researchers and organizations. This initiative is supported by major companies and aligns with global security best practices. By offering an automated security.txt generator for free, we aim to empower all of our users to enhance their security measures without additional costs.</p><p>In 2020, Cloudflare published the Cloudflare Worker for the security.txt generator as an <a href="https://github.com/cloudflare/securitytxt-worker?cf_history_state=%7B%22guid%22%3A%22C255D9FF78CD46CDA4F76812EA68C350%22%2C%22historyId%22%3A8%2C%22targetId%22%3A%22532D731DBD87B52B996FF5AD5ADDA824%22%7D"><u>open-source project on GitHub</u></a>, demonstrating our commitment to enhancing web security. This tool is actively used by Cloudflare to streamline vulnerability disclosure processes. However, over the past few years, we've observed a growing demand from our customers for an easier way to implement this standard. In response to this demand and to further support the adoption of security.txt across the Internet, we integrated it directly into our dashboard, making it simple for all our users to enhance their security practices. You can learn more about the initial release and its impact in our previous blog post <a href="https://blog.cloudflare.com/security-dot-txt/"><u>here</u></a>. </p>
    <div>
      <h3>Who can use the free Cloudflare security.txt generator</h3>
      <a href="#who-can-use-the-free-cloudflare-security-txt-generator">
        
      </a>
    </div>
    <p>This feature is designed for any Cloudflare user who manages a website, from <a href="https://www.cloudflare.com/small-business/">small business owners</a> to large enterprises, from developers to security professionals. Whether you're a seasoned security expert or new to website management, this tool provides an easy way to create and manage your security.txt file in your Cloudflare account, ensuring that you're prepared to handle vulnerability reports effectively.</p>
    <div>
      <h3>Technical insights: leveraging Cloudflare’s tools</h3>
      <a href="#technical-insights-leveraging-cloudflares-tools">
        
      </a>
    </div>
    <p>Our security.txt generator is seamlessly integrated into our dashboard. Here's how it works:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2z7tEph5hu4T7LCkZU5KFQ/8bc9c8efe332cda618c5dd8bb51e38da/image1.png" />
          </figure><p>When the user enters their data in the Cloudflare Dashboard, the information is immediately stored in a highly available and geo-redundant <a href="https://blog.cloudflare.com/performance-isolation-in-a-multi-tenant-database-environment/"><u>PostgreSQL database</u></a>. This ensures that all user data is securely kept and can be accessed quickly from any location within our global network.</p><p>Instead of creating a static file at the point of data entry, we use a dynamic approach. When a request for the security.txt file is made via the standard .well-known path specified by <a href="https://www.rfc-editor.org/rfc/rfc9116"><u>RFC 9116</u></a>, our system dynamically constructs the file using the latest data from our database. This method ensures that any updates made by users are reflected in real-time without requiring manual intervention or file regeneration. The data entered by users is synchronized across Cloudflare’s global network using our <a href="https://blog.cloudflare.com/introducing-quicksilver-configuration-distribution-at-internet-scale/"><u>Quicksilver</u></a> technology. This allows for rapid propagation of changes, ensuring that any updates to the security.txt file are available almost instantaneously across all servers.</p><p>Each security.txt file includes an expiration timestamp, which is set during the initial configuration. This timestamp helps alert users when their information may be outdated, encouraging them to review and update their details regularly. For example, if a user sets an expiration date 365 days into the future, they will receive notifications as this date approaches, prompting them to refresh their information.</p><p>To ensure compliance with best practices, we also support optional fields such as encryption keys and signatures within the security.txt file. Users can link to their PGP keys for secure communications or include signatures to verify authenticity, enhancing trust with security researchers.</p><p>Users who prefer automation can manage their security.txt files through our <a href="https://developers.cloudflare.com/api/operations/update-security-txt"><u>API</u></a>, allowing seamless integration with existing workflows and tools. This feature enables developers to programmatically update their security.txt configurations without manual dashboard interactions.</p><p>Users can also find a view of any missing security.txt files via <a href="https://developers.cloudflare.com/security-center/security-insights/"><u>Security Insights</u></a> under Security Center.</p>
    <div>
      <h3>Available now, and free for all Cloudflare users</h3>
      <a href="#available-now-and-free-for-all-cloudflare-users">
        
      </a>
    </div>
    <p>By making this feature available to all our users at no cost, we aim to support the security efforts of our entire community, helping you protect your digital assets and foster trust with your audience.</p><p>With the introduction of our free security.txt generator, we're taking a significant step towards simplifying security management for everyone. Whether you're a small business owner or a large enterprise, this tool empowers you to adopt industry best practices and ensure that you're ready to handle vulnerability reports effectively. <a href="https://developers.cloudflare.com/security-center/infrastructure/security-file/"><u>Set up security.txt</u></a> on your websites today!</p> ]]></content:encoded>
            <category><![CDATA[Better Internet]]></category>
            <category><![CDATA[Security Posture]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Standards]]></category>
            <category><![CDATA[security.txt]]></category>
            <guid isPermaLink="false">1uvkAn3IB6vSEO91XsPyAO</guid>
            <dc:creator>Alexandra Moraru</dc:creator>
            <dc:creator>Sam Khawasé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Secure your unprotected assets with Security Center: quick view for CISOs]]></title>
            <link>https://blog.cloudflare.com/security-insights-quick-ciso-view/</link>
            <pubDate>Tue, 05 Mar 2024 14:02:00 GMT</pubDate>
            <description><![CDATA[ Today we are excited to introduce a new set of capabilities within the Security Center to directly address a common challenge: ensuring comprehensive deployment across your infrastructure. Gain precise insights into where and how to optimize your security posture ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7M5yJ8aoOlRhR4sSsV4rgM/4634f2c04e6bef1400ce6ea024a032d7/image3-1.png" />
            
            </figure><p>We understand that one of the significant hurdles faced by our customers, especially larger organizations, is obtaining a clear view of the deployment of Cloudflare services throughout their vast and complex infrastructures. The question isn't just whether Cloudflare is deployed, but whether it's fully optimized across every asset and service. Addressing this challenge head-on, we're rolling out a new feature set designed to provide better visibility and control over your security posture.</p>
    <div>
      <h3>The problem we are addressing</h3>
      <a href="#the-problem-we-are-addressing">
        
      </a>
    </div>
    <p>The core problem we're tackling is the growing complexity of cyber threats and <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">the expanding attack surface</a>, which complicates maintaining a strong security posture for our customers.</p><p>It's not uncommon for organizations to deploy a variety of security solutions, including ours, without fully optimizing and implementing their configurations. This results in a false sense of security, underutilized investments and, more critically, exposed vulnerabilities. Our customers frequently express concerns about not having a clear picture of their security posture across their entire infrastructure, uncertain if critical assets are adequately protected or if specific Cloudflare security features could be better leveraged.</p><p>We want to bring users comprehensive visibility into their security configurations and the state of their deployments across Cloudflare's suite of products. By providing actionable insights into underconfigured areas, unassigned resources, or unutilized features, we aim to close the security gaps and enhance the overall defense mechanisms of our customers' digital ecosystems. This improvement is not just about leveraging technology but about promoting a culture of proactive security management, where every piece of the digital infrastructure is consistently and optimally protected.</p>
    <div>
      <h3>How we're solving this inside Security Center</h3>
      <a href="#how-were-solving-this-inside-security-center">
        
      </a>
    </div>
    <p><a href="/security-center/">More than two years ago</a>, we took on the mission to consolidate our extensive suite of security products, security expertise, and our unique insights into Internet threats into one comprehensive solution — the Cloudflare <a href="https://www.cloudflare.com/en-gb/application-services/products/securitycenter/">Security Center</a>. Launched with the vision to simplify attack surface management and make advanced security intelligence actionable for organizations of all sizes, Security Center has since become the one-stop quick view to evaluate your security posture.</p><p>Today, we build on this foundation to address a pain point for many of our large customers: ensuring complete Cloudflare protection across their entire digital infrastructure.</p><p>Our latest update in the Security Center focuses on delivering detailed insights into Cloudflare's deployment status across your digital assets. This encompasses identifying applications where critical services like WAF, Access, and other <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">security protection tools</a> might not be fully configured or optimized, thereby weakening your security posture.</p><p>In addition to these insights, we are introducing a quick view within Security Center Insights, designed to offer <a href="https://www.cloudflare.com/ciso/">CISOs</a> and security teams a quick and comprehensive view of their current Cloudflare product configurations at any given moment, along with recommendations for enhancements, under the Security optimization snapshot on the dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48Ts4LyhRSDf9Ls61ftOHD/34e3f3f5eb8115fa81158295af8c9335/image1-2.png" />
            
            </figure><p>Leveraging these new insights, Cloudflare users can now take proactive steps to close any gaps in their security framework. By offering a granular view of where specific Cloudflare services can be better utilized, we're not just solving a visibility problem — we're delivering actionable security intelligence. This means decisions can be made swiftly, ensuring that your defenses not only keep pace with, but stay ahead of, potential threats.</p><p>For instance, we'll highlight if WAF is deployed on only a portion of your zones, where Email Security could be leveraged, or if certain assets are unprotected by Access controls. We’re also making it easier for you to see if you are missing any critical setup like Page Shield, ensuring the product is configured, so you are not just one step closer to becoming compliant with standards like PCI DSS, but are also protected against evolving threats. We are outlining newly discovered API endpoints that require your attention as well.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FZV6K08ssc7UM60Za47zs/f93d568b1b851dbfd144562312b91fc1/image2-1.png" />
            
            </figure><p>Finally, users can now export their Security Insights using our <a href="https://developers.cloudflare.com/api/operations/get-security-center-issue-types">public API</a>, and will soon be able to do the same directly from the Cloudflare Dashboard, with a simple click of a button!</p>
    <div>
      <h3>Accessing Security Center Insights</h3>
      <a href="#accessing-security-center-insights">
        
      </a>
    </div>
    <p>Security Center Insights is available to all Cloudflare dashboard users that are Administrators of their Cloudflare account.</p><p>Regardless of the size or scope of your deployment, our goal is to empower every user with the tools needed to achieve a robust security posture, which they can continuously influence by improving existing configurations, adding new solutions, and discovering new vulnerabilities.</p>
    <div>
      <h3>Future Security Center roadmap</h3>
      <a href="#future-security-center-roadmap">
        
      </a>
    </div>
    <p>We’re constantly adding other relevant security insights to help improve your security posture, covering exposed infrastructure, insecure configurations, optimisations, new products, and more, including the ability to easily export these for reporting purposes. Moreover, stay tuned for a completely new reporting platform that will automatically deliver curated and contextualized security insights directly into your inbox — showcasing the power of Cloudflare’s security portfolio. The periodic reports will be complemented by a personalized interactive in-dashboard reporting experience.</p><p>Check out your security insights under your account’s Security Center now and take action to improve your security posture with Cloudflare!</p><p>If you would like to join us in building the Security Center or other exciting Cloudflare products, see our <a href="https://www.cloudflare.com/careers/jobs/">open positions</a> and learn more about <a href="https://www.cloudflare.com/en-gb/careers/">life@Cloudflare</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security Center]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Security Posture]]></category>
            <category><![CDATA[Insights]]></category>
            <guid isPermaLink="false">2lC0z3ZmqQffklxIp7UXzw</guid>
            <dc:creator>Alexandra Moraru</dc:creator>
        </item>
    </channel>
</rss>