Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 3 Federal IT Priorities: A Strategy for Modernization

Federal Sales Director Anish Patel outlines the three anchors of a modern federal IT strategy: digital experiences, AI innovation, and assertive defense. Discover how Cloudflare provides the unique platform needed to accelerate all three priorities simultaneously while protecting critical government networks.

Digital Transformation in Manufacturing: Complete Implementation Guide

The integration of software, data, and machines is the key driving factor of digital transformation in the manufacturing industry. By leveraging technology such as: Manufacturers can improve productivity, reduce costs, and enhance decision-making. Scalable by design, these systems also support long-term growth and innovation.

Why This AWS Move Matters

Over the past year, I have spent a lot of time with security leaders who are trying to navigate the same tension. They know their operations need to move faster. They know the volume, speed, and complexity of what lands in the SOC are not going to ease up. But they are also trying to make smart decisions in environments where trust matters, governance matters, and the cost of getting it wrong is real.

Our ongoing commitment to privacy for the 1.1.1.1 public DNS resolver

Exactly 8 years ago today, we launched the 1.1.1.1 public DNS resolver, with the intention to build the world’s fastest resolver — and the most private one. We knew that trust is everything for a service that handles the "phonebook of the Internet." That’s why, at launch, we made a unique commitment to publicly confirm that we are doing what we said we would do with personal data.

AWS Accelerator Program: How to Move to the Cloud Faster (and Cheaper)

Cloud migrations have a reputation for running over budget and behind schedule. That reputation isn’t entirely undeserved — migrations done without structure often do. But AWS has invested heavily in programs that give businesses a faster, cheaper path to the cloud, and most organizations don’t know they exist or how to access them. The AWS Accelerator Program is one of the more practical frameworks available for SMBs and mid-market companies planning a move to AWS.

Sovereign Cloud vs Public Cloud: A Side-by-Side Technical Comparison

Cloud adoption is no longer a binary decision. Most enterprises already use public cloud in some form. The real question in 2026 is whether that model satisfies growing requirements around data residency, regulatory compliance, and jurisdictional control. Sovereign cloud has emerged as a response to those pressures. It is designed to ensure that data, infrastructure, and operational control remain within a defined legal boundary. For organizations operating in regulated industries or across multiple jurisdictions, that distinction has become critical.

Introducing Programmable Flow Protection: custom DDoS mitigation logic for Magic Transit customers

We're proud to introduce Programmable Flow Protection: a system designed to let Magic Transit customers implement their own custom DDoS mitigation logic and deploy it across Cloudflare’s global network. This enables precise, stateful mitigation for custom and proprietary protocols built on UDP. It is engineered to provide the highest possible level of customization and flexibility to mitigate DDoS attacks of any scale.

Kimi Found 40+ Security Issues in Our Code. Open Source AI Is Here | Michelle Chen

In this episode of This Week in NET, host João Tomé is joined by Michelle Chen from Cloudflare’s AI product team to discuss the rise of open models, the launch of Kimi 2.5 on Workers AI, and why enterprises are rethinking the cost of proprietary AI.

Behavioral Analysis in Cloud Workload Protection: Why Runtime Detection Is Now Mandatory

Cloud environments don’t follow the same rules traditional data centers did. Workloads spin up in seconds, containers live and die within a single request cycle, serverless functions execute without a persistent footprint, and infrastructure scales faster than any manual security process can track. The security problem this creates isn’t just about scale. It’s about visibility.

Cloudflare Client-Side Security: smarter detection, now open to everyone

Client-side skimming attacks have a boring superpower: they can steal data without breaking anything. The page still loads. Checkout still completes. All it needs is just one malicious script tag. If that sounds abstract, here are two recent examples of such skimming attacks: To further our goal of building a better Internet, Cloudflare established a core tenet during our Birthday Week 2025: powerful security features should be accessible without requiring a sales engagement.