Cloudflare

Sandboxing AI agents, 100x faster

How to safely execute untrusted AI-generated code with minimal latency and resource overhead.

security edge-computing
4 min
Cloudflare

Introducing Custom Regions for precision data control

Customers needed precise control over where their data is processed geographically to meet diverse compliance requirements (e.g., GDPR, data sovereignty laws), but existing pre-defined regional options were too coarse-grained to cover all regulatory and performance needs.

distributed-systems security
4 min
Cloudflare

Standing up for the open Internet: why we appealed Italy’s "Piracy Shield" fine

Italy's 'Piracy Shield' system forces Internet infrastructure providers like Cloudflare to block content at the network level without proper oversight or due process, leading to disproportionate overblocking of legitimate content.

security api-design
4 min
Cloudflare

AI Security for Apps is now generally available

Organizations struggle to discover and secure AI-powered applications across their infrastructure, especially shadow AI deployments that teams spin up without central oversight, creating security blind spots.

security api-design
4 min
Cloudflare

Active defense: introducing a stateful vulnerability scanner for APIs

Standard defensive security tools miss logic flaws and vulnerabilities in APIs because they lack understanding of stateful API interactions and business logic flows.

security api-design
3 min
Cloudflare

Announcing Cloudflare Account Abuse Protection: prevent fraudulent attacks from bots and humans

Traditional bot-blocking approaches are insufficient for preventing account abuse (e.g., credential stuffing, fake account creation) because sophisticated attacks increasingly involve human-like behavior or actual humans, bypassing conventional bot detection.

security rate-limiting
3 min
Cloudflare

Building a security overview dashboard for actionable insights

Security teams were overwhelmed by the volume of raw security data across Cloudflare's platform, making it difficult to prioritize and act on vulnerabilities and threats efficiently.

security observability
3 min
Cloudflare

Complexity is a choice. SASE migrations shouldn’t take years.

Enterprise SASE (Secure Access Service Edge) migrations traditionally take 18+ months due to architectural complexity, requiring organizations to integrate networking and security across global infrastructure.

security distributed-systems
3 min
Cloudflare

Fixing request smuggling vulnerabilities in Pingora OSS deployments

Cloudflare's open-source Pingora proxy had request smuggling vulnerabilities when deployed as an ingress proxy, allowing attackers to exploit HTTP parsing discrepancies to bypass security controls and route malicious requests.

security api-design
3 min
Cloudflare

From legacy architecture to Cloudflare One

Organizations struggle to migrate from legacy network security architectures to modern SASE (Secure Access Service Edge) solutions, facing risks from accumulated technical debt and complex dependencies in their existing infrastructure.

security microservices
3 min
Cloudflare

Investigating multi-vector attacks in Log Explorer

Security teams lacked a unified view across multiple Cloudflare datasets, making it difficult to identify and investigate multi-vector attacks that span different attack surfaces and log sources.

observability security
3 min
Cloudflare

Translating risk insights into actionable protection: leveling up security posture with Cloudflare and Mastercard

Organizations struggle with Internet-facing blind spots in their attack surface, lacking continuous visibility into security gaps and risk exposures across their external-facing assets.

security
4 min
Cloudflare

Always-on detections: eliminating the WAF “log versus block” trade-off

Traditional WAFs force a trade-off between logging (risking missed attacks) and blocking (risking false positives), requiring extensive manual tuning to balance security coverage with availability.

security real-time-systems
4 min
Cloudflare

From the endpoint to the prompt: a unified data security vision in Cloudflare One

Organizations face fragmented data security across endpoints, network traffic, cloud applications, and AI prompts, making it difficult to enforce consistent data loss prevention (DLP) policies as data flows through diverse channels including RDP sessions and AI copilots.

security api-design
3 min
Cloudflare

How Automatic Return Routing solves IP overlap

Enterprises connecting multiple private networks via tunnels frequently encounter overlapping IP address ranges (e.g., multiple sites using 10.0.0.0/8), making traditional routing tables unable to determine which tunnel should receive return traffic.

distributed-systems security
4 min