The Roadmap To Zero Trust

Secure your distributed workforce

Solve the challenges of traditional network architecture without disrupting employee productivity and connectivity

Featured Content

Current and future state of HTTP

Extensions to come in 2023 to keep up with modern and new applications

The future of web application security

What does the emergence of new vectors and an increase in frequency and sophistication of attacks mean for security

Optimizing app development

Next-gen serverless platforms eliminate tedious tasks and enable developer focus while offering cost savings

Securing the post-quantum world

Quantum computing is inevitable — cryptography is preparing for the future

Receive a monthly recap of the most popular Internet insights!

"Internet for All'' gains attention

All 50 states and every eligible territory have signed on to the “Internet for All'' initiative

RPKI secures Internet routing

How RPKI reduces the risk of accidental route leaks and helps mitigate incidents

Commitment to sustainability

Offsetting our emissions by investing in 6,060 MTs’ worth of reforestation carbon offsets

Live streaming for video conference tools

New standards will enhance the ability to add live streaming to Google Meet, Zoom, and more

Protecting free expression

Cloudflare provides over 2,000 organizations with cyber security that protects human rights and democracy

The benefits of Web3 and blockchain

Chris Dixon, GP at a16z, and Matthew Prince, CEO of Cloudflare discuss how Web3 improves the digital world

Using Linux Kernel Key to prevent crypto leaks

Ensuring a high degree of data security in application development

Jamstack can revolutionize websites

Improve website development and ease the strain for the developer and the bottom line

Securing Web3

As businesses begin exploring Web3, there will be new requirements to maintain their security posture

How blockchain carries us into Web3

Reshaping the Internet in the interest of security, privacy, and reliability

A primer on Elliptic Curve Cryptography

If you want the highest level of security while maintaining performance, ECC makes sense to adopt

Advancing post-quantum security

Post-quantum cryptography will help protect against threats that come with quantum computing

The evolving DNS threat landscape

3 novel threat vectors join a long list of persistent DNS security threats

Securing the Internet of things

Exponential growth in IoT has brought an explosion in risk

Quantum cryptography experimentation

This is just a small, but important first step towards a secure and private quantum-secure Internet

TLS threatened by quantum computers

TLS is threatened by quantum computers explore what we need to make it quantum-secure

Security implications of Web3

Considerations as you explore the decentralized web

Security keys to secure the web

Fireside chat on the importance of hardware keys for protecting against phishing and other online attacks

Challenges of data regulation

Data regulations aimed at protecting consumer privacy are sometimes hard to interpret, constantly changing, and difficult to comply with

Flexibility and security with NaaS and SASE

Organizations must secure their workforce from any location, which requires a holistic security strategy that eliminates complexity and security gaps