Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Securing Cloudflare with Cloudflare: a Zero Trust journey

Cloudflare is committed to providing our customers with industry-leading network security solutions. At the same time, we recognize that establishing robust security measures involves identifying potential threats by using processes that may involve scrutinizing sensitive or personal data, which in turn can pose a risk to privacy. As a result, we work hard to balance privacy and security by building privacy-first security solutions that we offer to our customers and use for our own network.

Secure your unprotected assets with Security Center: quick view for CISOs

We understand that one of the significant hurdles faced by our customers, especially larger organizations, is obtaining a clear view of the deployment of Cloudflare services throughout their vast and complex infrastructures. The question isn't just whether Cloudflare is deployed, but whether it's fully optimized across every asset and service. Addressing this challenge head-on, we're rolling out a new feature set designed to provide better visibility and control over your security posture.

Protecting APIs with JWT Validation

Today, we are happy to announce that Cloudflare customers can protect their APIs from broken authentication attacks by validating incoming JSON Web Tokens (JWTs) with API Gateway. Developers and their security teams need to control who can communicate with their APIs. Using API Gateway’s JWT Validation, Cloudflare customers can ensure that their Identity Provider previously validated the user sending the request, and that the user’s authentication tokens have not expired or been tampered with.

DevSecOps in an AI world requires disruptive log economics

We’ve been talking about digital transformation for years (or even decades?), but the pace of evolution is now being catapulted forward by AI. This rapid change and innovation creates and relies upon exponential data sets. And while technology is rapidly evolving to manage and maintain these massive data sets, legacy pricing models based on data ingest volume are lagging behind, making it economically unsustainable.

Netskope One: The Only Enterprise-Grade SASE Platform That Integrates One Engine, One Client, One Gateway, and One Network

Today we are very excited to unveil Netskope One, which is our new name for the full range of market-leading Netskope capabilities that are contained in, and delivered by, a single platform. Netskope One enables security, infrastructure and operations (I&O) teams to reduce risk, cost, and complexity, protecting and accelerating everything to everywhere. Not only can we offer these unique capabilities; crucially, we are the only vendor that can deliver them all in a single platform.

Introducing the Salt Developer Portal: Unleash the Power of Automating API Security

AppSec leaders and security practitioners, rejoice! Automating your security practices using Salt Platform APIs is now easier than ever, empowering developers to integrate APIs quickly and efficiently while helping reduce risk. The newly launched Salt Developer Portal is your one-stop hub for all API security automation needs.

The 7 Best VPN Extensions For Chrome in 2024

A virtual private network (VPN) is a technology service that creates a secure and encrypted connection between a computing device and an Internet network. Users typically buy or sign up to a VPN service for: Despite being the most used web browser in the world, Google Chrome doesn't have its own VPN. However, the Chrome Web Store has a plethora of providers that can add third-party VPNs or proxies as an extension on your web browser for quick and easy use.

EP 47 - Digital Trust and the Identity Cornerstone

In this episode of Trust Issues, Jan Vanhaecht, the Global Digital Identity Leader at Deloitte, Belgium, delves into the intricate realms of digital trust and risk management with host David Puner. The discussion covers topics ranging from the impact of regulations on cybersecurity practices to the pivotal role of identity in building a robust security culture.