Start auditing and controlling the AI models accessing your content
In a world where AI is constantly evolving, it is crucial to audit and control the AI models accessing your content. By staying vigilant, we can ensure that our data is being used ethically and responsibly.
Read more
Helping keep customers safe with leaked password notification
In a world where cyber threats are constantly evolving, leaked password notifications are a crucial tool in protecting customers. By promptly alerting individuals to compromised passwords, businesses can help prevent unauthorized access to personal accounts and data.
Read more
Protecting APIs from abuse using sequence learning and variable order Markov chains
In a world where API abuse is rampant, businesses are turning to innovative solutions like sequence learning and variable order Markov chains to protect their valuable data. These cutting-edge techniques are revolutionizing the way we safeguard APIs.
Read more
How we ensure Cloudflare customers aren’t affected by Let’s Encrypt’s certificate chain change
In a seamless transition, Cloudflare is working around the clock to ensure customers are shielded from any disruptions caused by Let's Encrypt's certificate chain change. Find out how we are keeping your online presence secure and uninterrupted.
Read more
Introducing Ephemeral IDs: a new tool for fraud detection
Introducing Ephemeral IDs: the innovative new tool that is revolutionizing fraud detection. Say goodbye to traditional methods and hello to enhanced security with this cutting-edge technology.
Read more
Continuing our work with CISA and the Joint Cyber Defense Collaborative to keep vulnerable communities secure online
As we move forward in our partnership with CISA and the Joint Cyber Defense Collaborative, we remain committed to protecting vulnerable communities online. Stay tuned to see how we are working together to enhance cybersecurity measures for those who need it most.
Read more
A global assessment of third-party connection tampering
In a world where interconnectivity is key, a global assessment of third-party connection tampering has revealed alarming vulnerabilities. From data breaches to unauthorized access, the risk posed by these malicious interlopers is a growing concern for businesses and individuals alike.
Read more
Paris 2024 Olympics recap: Internet trends, cyber threats, and popular moments
Paris 2024 Olympics was a spectacle of athletic achievement, but also a platform for digital innovation. From viral memes to cyber threats, the games were a reflection of the modern interconnected world.
Read more
Log Explorer: monitor security events without third-party storage
Introducing Log Explorer - the ultimate tool for monitoring security events without the need for third-party storage. Keep your data safe and secure with this innovative solution.
Read more