October is European Cybersecurity Month, an annual advocacy campaign to raise awareness of cyber risks among citizens and businesses, and to share best practices in cybersecurity. This year’s campaign was launched at an event in Estonia, a country which both holds the current Presidency seat of the European Council
I work at a company whose job it is to be attacked. As I’m writing this, an automatic mitigation is fighting two ongoing DDoS attacks. Any machine that’s publicly routable on the internet today can be a vector for attack, and that’s a problem. Today we want
In the real world, tunnels are often carved out from the mass of something bigger - a hill, the ground, but also man-made structures. CC BY-SA 2.0 image by Matt Brown In an abstract sense Cloudflare Warp is similar; its connection strategy punches a hole through firewalls and NAT,
Cloudflare’s customers recognize that they need to protect the confidentiality and integrity of communications with their web visitors. The widely accepted solution to this problem is to use the SSL/TLS protocol to establish an encrypted HTTPS session, over which secure requests can then be sent. Eavesdropping is protected
Today we announced Geo Key Manager, a feature that gives customers unprecedented control over where their private keys are stored when uploaded to Cloudflare. This feature builds on a previous Cloudflare innovation called Keyless SSL and a novel cryptographic access control mechanism based on both identity-based encryption and broadcast encryption.
Ben Sadeghipour, Technical Account Manager, HackerOne, and Katie Moussouris, Founder & CEO, Luta Security Moderator: John Graham-Cumming, CTO, Cloudflare JGC: We’re going to talk about hacking Katie Moussouris helps people how to work around security vulnerabilities. Ben Sadeghipour is a technical account manager at HackerOne, and a hacker at
Avril Haines, Former Deputy National Security Advisor, Obama Administration Moderator: Doug Kramer, General Counsel, Cloudflare Avril began her career on the National Security Council, and went on to become the first female deputy at the CIA. DK: How will cyber will play a role in military operations? AH: We look
This blog post presents a new cryptography primitive that we open sourced: p751sidh. The Quantum Threat Most of today's cryptography is designed to be secure against an adversary with enormous amounts of computational power. This means estimating how much work certain computations (such as factoring a number, or finding a