Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Protocol detection with Cloudflare Gateway

Cloudflare Gateway, our secure web gateway (SWG), now supports the detection, logging, and filtering of network protocols regardless of their source or destination port. Protocol detection makes it easier to set precise policies without having to rely on the well known port and without the risk of over/under-filtering activity that could disrupt your users’ work. For example, you can filter all SSH traffic on your network by simply choosing the protocol.

Launching email security insights on Cloudflare Radar

During 2021's Birthday Week, we announced our Email Routing service, which allows users to direct different types of email messages (such as marketing, transactional, or administrative) to separate accounts based on criteria such as the recipient’s address or department. Its capabilities and the volume of messages routed have grown significantly since launch.

Log Explorer: monitor security events without third-party storage

Today, we are excited to announce beta availability of Log Explorer, which allows you to investigate your HTTP and Security Event logs directly from the Cloudflare Dashboard. Log Explorer is an extension of Security Analytics, giving you the ability to review related raw logs.

Teleport Community Edition will restrict commercial usage starting with version 16

We open sourced Teleport in 2015 with a mission to secure access to infrastructure. It has since become a popular open source project with over 15,000 GitHub stars and is licensed under AGPLv3. We have been offering the stable releases of the Teleport Community Edition binaries and images distributed under the permissive Apache 2.0 license.

Achieving Seamless SSO Integration: Why BlockSurvey Selected BoxyHQ

In a world where data privacy has become a paramount concern, BlockSurvey stands out as a beacon of trust and security. Committed to empowering users with complete ownership over their data, BlockSurvey faced the challenge of ensuring enterprise-level security and privacy for its customers. The solution? BoxyHQ’s Single Sign-On powered by the open-source SAML Jackson.

Including Digital Risk Protection in Your Threat Detection and Response Strategy

Many organizations focus on addressing the risks within their internal attack surface while overlooking the potential threats created by their external digital footprint on the surface, deep and dark web. This article outlines how companies can significantly mitigate this risk by combining digital risk protection with their detection and response approach.

What Is MXDR and Why Do You Need It?

Managed XDR (MXDR) is a service-led security solution that uses a wide range of telemetry sources to better unify and automate incident investigation, analysis, and response. Extended Detection and Response (XDR) is the technology at the heart of MXDR. It is a security platform that unifies telemetry across multiple security layers, such as networks, endpoints, applications, email, identities, and cloud services, into a single platform.

How to Disseminate Honeytokens At Scale: Step-by-Step Guide to Deployment Jobs

Learn how GitGuardian Honeytoken's new feature, Deployment Jobs, revolutionizes early breach detection and code repository protection. Automate honeytoken deployment across multiple repositories with ease, ensuring ongoing security and peace of mind.

Why Identity Security Is Essential to Cybersecurity Strategy

In the modern digital landscape, cybersecurity isn’t just a technical challenge – it’s a business imperative. At the heart of cybersecurity is identity security – the principle that the right people have the right access at the right time. As we venture further into the digital world, protecting the business from modern threats is crucial, which inherently adds complexity, making smart privilege controls a must-have step toward an identity-first strategy.

(Re)Imagine Workplace Access Management

As organizations seek out solutions to secure their hybrid and remote workplace, some daily tasks like signing into 10, 20, or 30 applications can really interfere with employee productivity. The fatigue of remembering so many passwords for so many applications nearly always leads to undesirable password behaviors such as password re-use and choosing weak passwords, plus the annoyance of forgotten passwords and the burden of resets.