Start auditing and controlling the AI models accessing your content

Start auditing and controlling the AI models accessing your content
In a world where AI is constantly evolving, it is crucial to audit and control the AI models accessing your content. By staying vigilant, we can ensure that our data is being used ethically and responsibly.
Read more

Helping keep customers safe with leaked password notification

Helping keep customers safe with leaked password notification
In a world where cyber threats are constantly evolving, leaked password notifications are a crucial tool in protecting customers. By promptly alerting individuals to compromised passwords, businesses can help prevent unauthorized access to personal accounts and data.
Read more

Protecting APIs from abuse using sequence learning and variable order Markov chains

Protecting APIs from abuse using sequence learning and variable order Markov chains
In a world where API abuse is rampant, businesses are turning to innovative solutions like sequence learning and variable order Markov chains to protect their valuable data. These cutting-edge techniques are revolutionizing the way we safeguard APIs.
Read more

How we ensure Cloudflare customers aren’t affected by Let’s Encrypt’s certificate chain change

How we ensure Cloudflare customers aren’t affected by Let’s Encrypt’s certificate chain change
In a seamless transition, Cloudflare is working around the clock to ensure customers are shielded from any disruptions caused by Let's Encrypt's certificate chain change. Find out how we are keeping your online presence secure and uninterrupted.
Read more

Introducing Ephemeral IDs: a new tool for fraud detection

Introducing Ephemeral IDs: a new tool for fraud detection
Introducing Ephemeral IDs: the innovative new tool that is revolutionizing fraud detection. Say goodbye to traditional methods and hello to enhanced security with this cutting-edge technology.
Read more

Continuing our work with CISA and the Joint Cyber Defense Collaborative to keep vulnerable communities secure online

Continuing our work with CISA and the Joint Cyber Defense Collaborative to keep vulnerable communities secure online
As we move forward in our partnership with CISA and the Joint Cyber Defense Collaborative, we remain committed to protecting vulnerable communities online. Stay tuned to see how we are working together to enhance cybersecurity measures for those who need it most.
Read more

A global assessment of third-party connection tampering

A global assessment of third-party connection tampering
In a world where interconnectivity is key, a global assessment of third-party connection tampering has revealed alarming vulnerabilities. From data breaches to unauthorized access, the risk posed by these malicious interlopers is a growing concern for businesses and individuals alike.
Read more

Protecting APIs with JWT Validation

Protecting APIs with JWT Validation
APIs are the backbone of modern software development. But with great power comes great responsibility. Learn how JWT validation can safeguard your APIs and keep your data secure.
Read more

Paris 2024 Olympics recap: Internet trends, cyber threats, and popular moments

Paris 2024 Olympics recap: Internet trends, cyber threats, and popular moments
Paris 2024 Olympics was a spectacle of athletic achievement, but also a platform for digital innovation. From viral memes to cyber threats, the games were a reflection of the modern interconnected world.
Read more

Log Explorer: monitor security events without third-party storage

Log Explorer: monitor security events without third-party storage
Introducing Log Explorer - the ultimate tool for monitoring security events without the need for third-party storage. Keep your data safe and secure with this innovative solution.
Read more