Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blog.cloudflare.com

CloudFlare

Get the latest updates from CloudFlare directly as they happen.

Follow now 1145 followers

Latest posts

Last updated 2 days ago

From the endpoint to the prompt: a unified data security vision in Cloudflare One

2 days ago

Cloudflare One has grown a lot over the years. What started with...

Ending the "silent drop": how Dynamic Path MTU Discovery makes the Cloudflare One Client more resilient

3 days ago

You’ve likely seen this support ticket countless times: a user’s Internet connection...

A QUICker SASE client: re-building Proxy Mode

4 days ago

When you need to use a proxy to keep your zero trust...

How Automatic Return Routing solves IP overlap

4 days ago

The public Internet relies on a fundamental principle of predictable routing: a...

Always-on detections: eliminating the WAF “log versus block” trade-off

4 days ago

Traditional Web Application Firewalls typically require extensive, manual tuning of their rules...

Mind the gap: new tools for continuous enforcement from boot to login

4 days ago

One of our favorite ask-me-anything questions for company meetings or panels at...

Defeating the deepfake: stopping laptop farms and insider threats

5 days ago

Trust is the most expensive vulnerability in modern security architecture. In recent...

Moving from license plates to badges: the Gateway Authorization Proxy

5 days ago

We often talk about the "ideal" state, one where every device has...

Stop reacting to breaches and start preventing them with User Risk Scoring

5 days ago

Most security teams spend their days playing a high-stakes game of Whac-A-Mole...

Evolving Cloudflare’s Threat Intelligence Platform: actionable, scalable, and ETL-less

5 days ago

For years, the cybersecurity industry has suffered from a "data gravity" problem...

Introducing the 2026 Cloudflare Threat Report

5 days ago

Today’s threat landscape is more varied and chilling than ever: Sophisticated nation-state...

From reactive to proactive: closing the phishing gap with LLMs

6 days ago

Email security has always been defined by impermanence. It is a perpetual...