Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloudflare Radar Reels Ep 5 - Powering AI with Global Scale & Real-Time Insights

AI breakthroughs demand speed, scale, and visibility. From image creation to real-time text analysis, next-gen AI depends on lightning-fast networks. Cloudflare’s presence in 330+ cities makes it happen. Cloudflare's Radar Display gives you a front-row view of the trends shaping AI’s future.

Loyalty Fraud Cost Businesses

Think credit card fraud is the biggest threat to eCommerce? Think again. Loyalty fraud cost businesses $4B in 2024, and most companies didn't see it coming. Why? Because the attack vector isn't obvious. It's: Credential stuffing + password spraying Poorly managed APIs connecting loyalty platforms to 3rd parties No real-time detection when the bad guys cash in points for untraceable gift cards.

How Retailers Are Fighting Back Against Fraud with Andy Dean and Christian Reilly

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by Andy Dean, Head of Technical Operations at AllSaints, and Christian Reilly, Field CTO of EMEA at Cloudflare, to unpack what real-world digital transformation looks like, specifically how enterprises can navigate the complex balance between security and scalability, from managing multi-vendor environments to modernizing legacy infrastructure.

Evolving App Strategy

Every business hits this fork in the road: Do we build or do we buy? Andy Dean and Christian Reilly break it down simply: Buy doesn't always mean SaaS; it can mean bringing in complex systems like SAP. But complexity creeps fast. M&A, new markets, legacy apps, all of it adds layers. To win long-term, you need a clear target architecture and guardrails to reduce drift. That's where automation, cloud landing zones, and Infrastructure-as-Code come in.

Smarter Load Balancing for Modern Apps

Traditional load balancers weren’t built for today’s distributed applications. As workloads span clouds and regions, you need more flexibility—and fewer bottlenecks. Join us to learn how Cloudflare Load Balancing, powered by our Connectivity Cloud, helps you: Route traffic based on performance, availability, or geography Avoid vendor lock-in and legacy infrastructure limitations Manage all your traffic with a unified set of policies and controls.

How to Build a Real-Time Social App on Cloudflare (No Servers Needed)

In this episode, host João Tomé is joined by Inanna Malick, Systems Engineer at Cloudflare, to talk about how she built a serverless version of a real-time social app that connects to the ATProto ecosystem — the protocol powering platforms like Bluesky. Inanna walks us through her blog post and technical journey, showing how she used Cloudflare Workers, Durable Objects, and the free tier of our Developer Platform to deploy an open, identity-owned, cryptographically verified social experience — all without running a server.

Boost Website Speed & Security with Cloudflare | A Quick Guide to Domain Onboarding

Unlock the power of Cloudflare! This quick guide illustrates how Cloudflare's global network improves website speed through caching and provides robust protection against online threats. We'll walk you through the simple process of onboarding your domain, updating your nameservers, and explain the core concepts of DNS and reverse proxying.

How Many Emails Are Malicious? | Cloudflare Radar Reels Ep 2 - Email Security & Global Attack Trends

Ever wondered how many emails in your inbox are actually malicious? Our Radar Display reveals the real numbers and global attack trends. Get the full picture and the details you need to stay ahead in today’s cyber threat landscape.

How to Build Influence in Cybersecurity

In high-growth environments, cybersecurity can either be a blocker or a built-in advantage. Olivier Busolini and his team at Mashreq chose the letter. In a high-stakes regulatory inspection, their close collaboration with tech and business teams paid off big time. The outcome? A rare compliment from regulators:"If you follow the advice of your security team, you’re good to go." This is what it looks like when cybersecurity is integrated, proactive, and trusted.