Announcing Turnstile, a user-friendly, privacy-preserving alternative to CAPTCHA
September 28, 2022 1:01 PM
Any website can use a simple API to replace CAPTCHAs with our invisible alternative, whether they’re on the Cloudflare network or not....
September 28, 2022 1:01 PM
Any website can use a simple API to replace CAPTCHAs with our invisible alternative, whether they’re on the Cloudflare network or not....
September 28, 2022 1:00 PM
Introducing Privacy Edge – a collection of products that make it easier for site owners and developers to protect their users’ privacy by default. ...
September 27, 2022 2:15 PM
Forester has recognised Cloudflare as a Leader in The Forrester Wave™: Web Application Firewalls, Q3 2022 report. The report evaluated 12 Web Application Firewall (WAF) providers on 24 criteria across current offering, strategy and market presence....
September 27, 2022 1:00 PM
Origin Rules is a dedicated product for ‘where does this traffic go where it leaves Cloudflare.’ Customers are able to match on an HTTP request using filters and override the host, port, SNI, and the origin a request resolves to....
September 26, 2022 1:15 PM
We’ve been defending customers from Internet of Things botnets for years now, and it’s time to turn the tides: we’re bringing the same security behind our Zero Trust platform to IoT...
September 22, 2022 1:00 PM
API Shield customers can save, update, and monitor the performance of API endpoints...
September 20, 2022 1:30 PM
Cloudflare started using Area 1 in 2020 and proceeded with acquiring the company in 2022. We were most impressed how phishing, responsible for 90+% of cyberattacks, basically became a non-issue overnight when we deployed Area 1. But our vision is much bigger than preventing phish...
September 19, 2022 2:01 PM
Cloudflare’s threat operations and research team, Cloudforce One, is now open for business and has begun conducting threat briefings. Join our webinar on “YackingYeti: How a Russian threat group targets Ukraine—and the world”, scheduled for October 12, to learn more...
September 06, 2022 4:15 PM
Gartner has recognised Cloudflare as a Leader in the 2022 "Gartner® Magic Quadrant™ for Web Application and API Protection (WAAP)" report that evaluated 11 vendors for their ‘ability to execute’ and ‘completeness of vision’...
August 30, 2022 2:00 PM
Today we are excited to announce thresholds for our Security Event Alerts: a new and improved way of detecting anomalous spikes of security events on your Internet properties. By introducing a threshold, we are able to make alerts more accurate and only notify you when it truly m...
August 11, 2022 1:00 PM
In 2022, cybersecurity, more than ever, is a must-have for those who don’t want to take chances on getting caught in a cyberattack with difficult to deal with consequences. Here’s a reading list what you need to know about attacks that is also a guide on how to be protected...
August 09, 2022 3:56 PM
Yesterday, August 8, 2022, Twilio shared that they’d been compromised by a targeted phishing attack. Around the same time as Twilio was attacked, we saw an attack with very similar characteristics also targeting Cloudflare’s employees...
August 06, 2022 4:15 PM
We’re announcing two major improvements to our 1.1.1.1 + WARP apps...
July 05, 2022 12:59 PM
In this post we go over improvements to script status, metadata and categorization....
June 29, 2022 11:45 AM
Learn how to patch Linux security vulnerabilities without rebooting the hardware and how to tighten the security of your Linux operating system with eBPF Linux Security Module...
June 24, 2022 2:15 PM
How Cloudflare’s security team implemented Zero Trust controls...
June 24, 2022 2:08 PM
Using Cloudflare Zero Trust with Kubernetes to enable kubectl without SOCKS proxies...
June 24, 2022 1:45 PM
This blog offers Cloudflare’s perspective on how remote browser isolation can help organizations offload internal web application use cases currently secured by virtual desktop infrastructure (VDI)...
June 22, 2022 1:38 PM
Security teams that rely on Cloudflare Access can verify a user’s Apple device before they access a sensitive application — no additional software required...