A look at the latest post-quantum signature standardization candidates

A look at the latest post-quantum signature standardization candidates
Explore the cutting-edge world of post-quantum cryptography with a look at the newest signature standardization candidates. The race to secure our digital future is on!
Read more

How we prevent conflicts in authoritative DNS configuration using formal verification

How we prevent conflicts in authoritative DNS configuration using formal verification
Efforts to prevent conflicts in authoritative DNS configurations are being advanced through the use of formal verification. By meticulously analyzing and validating configurations, we can ensure seamless and secure operation of DNS systems.
Read more

Introducing Access for Infrastructure: SSH

Introducing Access for Infrastructure: SSH
Access for Infrastructure simplifies remote server management with SSH. It provides secure access to servers, ensuring efficient deployment and maintenance.
Read more

Cloudflare’s URL Scanner, new features, and the story of how we built it

Cloudflare’s URL Scanner, new features, and the story of how we built it
Discover the fascinating story behind the creation of Cloudflare's innovative URL Scanner. Learn about the new features that make this tool a game-changer in website security. Join us on a journey of innovation and technology.
Read more

Linux kernel security tunables everyone should consider adopting

Linux kernel security tunables everyone should consider adopting
In the constantly evolving landscape of cybersecurity threats, it's essential for Linux users to consider adopting security tunables in their kernel. From network protocols to file permissions, implementing these measures can provide an extra layer of protection against potential vulnerabilities.
Read more

Introducing Ephemeral IDs: a new tool for fraud detection

Introducing Ephemeral IDs: a new tool for fraud detection
Introducing Ephemeral IDs: the innovative new tool that is revolutionizing fraud detection. Say goodbye to traditional methods and hello to enhanced security with this cutting-edge technology.
Read more

Introducing Automatic SSL/TLS: securing and simplifying origin connectivity

Introducing Automatic SSL/TLS: securing and simplifying origin connectivity
In the ever-evolving landscape of cybersecurity, the introduction of Automatic SSL/TLS is revolutionizing the way we secure and simplify origin connectivity. With this game-changing technology, organizations can rest assured that their data is protected without the hassle of manual configurations.
Read more