MORE POSTS
March 23, 2020 12:00 PM
Deploying security.txt: how Cloudflare’s security team builds on Workers
Today, we’re launching support for the security.txt initiative through Workers to help give security researchers a common location to learn about how to communicate with our team....
March 19, 2020 4:00 PM
Using Cloudflare Gateway to Stay Productive (and turn off distractions) While Working Remotely
This week, like most of you reading this article, I am working from home. I don’t know about you, but I’ve found it hard to stay focused when the Internet is full of news related to Coronavirus. ...
March 16, 2020 12:00 PM
Announcing Network Analytics
Back in March 2019, we released Firewall Analytics which provides insights into HTTP security events across all of Cloudflare's protection suite; Firewall rule matches, HTTP DDoS Attacks, Site Security Level which harnesses Cloudflare's threat intelligence, and more....
March 13, 2020 12:00 PM
Cloudflare's COVID-19 FAQs
As the status of COVID-19 continues to impact people and businesses around the world, Cloudflare is committed to providing awareness and transparency to our customers, employees, and partners....
March 12, 2020 9:57 PM
Cloudflare During the Coronavirus Emergency
We know that organizations and individuals around the world depend on Cloudflare and our network. I wanted to send you a personal note to let you know how Cloudflare is dealing with the Coronavirus emergency....
March 12, 2020 12:00 PM
Protect your team with Cloudflare Gateway
On January 7th, we announced Cloudflare for Teams, a new way to protect organizations and their employees globally, without sacrificing performance. Cloudflare for Teams centers around two core products - Cloudflare Access and Cloudflare Gateway....
March 11, 2020 12:00 PM
Open sourcing our Sentry SSO plugin
Cloudflare Access, part of Cloudflare for Teams, replaces legacy corporate VPNs with Cloudflare’s global network. Using your existing identity provider, Access enables your end users to login from anywhere — without a clunky agent or traffic backhaul through a centralized applian...
March 10, 2020 1:00 PM
How Replicated Developers Develop Remotely
Replicated is a 5-year old infrastructure software company with a focus on enabling a new model of enterprise software delivery that we call Kubernetes Off-The-Shelf (KOTS) Software....
March 09, 2020 8:00 PM
How to Build a Highly Productive Remote Team (or Team of Contractors) with Cloudflare for Teams
Much of IT has been built on two outdated assumptions about how work is done. First, that employees all sit in the same building or branch offices. Second, that those employees will work full-time at the same company for years....
March 09, 2020 12:00 PM
Cloudflare for Teams Free for Small Businesses During Coronavirus Emergency
Beginning today, we are making our Cloudflare for Teams products free to small businesses around the world. Teams enables remote workers to operate securely and easily. We will continue this policy for at least the next 6 months....
March 06, 2020 9:30 PM
How Cloudflare keeps employees productive from any location
Cloudflare employs more than 1,200 people in 13 different offices and maintains a network that operates in 200 cities. To do that, we used to suffer through a traditional corporate VPN that backhauled traffic through a physical VPN appliance....
March 04, 2020 1:00 PM
Pwned Passwords Padding (ft. Lava Lamps and Workers)
Starting today, we are offering a new security advancement in the Pwned Passwords API - API clients can receive responses padded with random data....
March 01, 2020 1:00 PM
Why Cloudflare Chose AMD EPYC for Gen X Servers
Looking back at this week's posts on the design, specifications, and performance of Cloudflare’s Gen X servers using AMD CPUs. Every server can run every service. This architectural decision has helped us achieve higher efficiency across the Cloudflare network. ...
February 28, 2020 2:00 PM
Securing Memory at EPYC Scale
At Cloudflare, we encrypt data both in transit (on the network) and at rest (on the disk). Both practices address some of the most common vectors used to exfiltrate information and these measures serve to protect sensitive data from attackers but, what about data currently in use...