Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

Protect your users from Internet risks

The Internet is now part of your corporate network, however browsing the web comes with hidden risks—malware, phishing attacks, and malicious websites. In this video, we’ll explore how Cloudflare’s Secure Web Gateway (SWG) helps keep users safe by filtering and inspecting Internet traffic in real time. Whether you're protecting a remote workforce or securing an entire organization, Cloudflare’s solution ensures that users can access the web securely—without sacrificing speed or productivity.

CrowdStrike Falcon Cloud Security Introduces Application Context to Runtime Detections

Since CrowdStrike’s acquisition of Bionic, we have been embedding application security posture management (ASPM) capabilities into CrowdStrike Falcon Cloud Security, creating a unified solution that bridges the gap between proactive security for cloud security teams and cloud runtime protection for security operations. We are excited to share new ASPM updates in Falcon Cloud Security, built to help teams detect and respond faster to today’s cloud-focused adversaries.

Fireblocks x AWS: A Blueprint For Tokenized Asset Deployment and Management

The real-world asset tokenization market is projected to reach $200 billion by 2030, underscoring the enormous potential in this space. However, bringing digital assets to market presents non-trivial considerations and a need for infrastructure providers and software vendors to collectively fulfill functional and non-functional tokenization platform requirements.

Connect and secure from any network to anywhere

Build your new corporate network with Cloudflare, connecting any network into our modern SASE platform. In this video learn all the different methods of connecting networks to Cloudflare and what services can then be used to improve security and performance. Chapters: Watch the rest of the videos in our series to learn more about Cloudflare's SASE platform. Dive deep into the architecture of how our SASE platform works by reading our reference architecture content.

Secure remote access to your critical infrastructure

Applications, databases and their servers are running in a variety of locations. From on-premises data centers to cloud hyperscalers, making the need to secure administrative access more important than ever. In this video learn how Cloudflare's SASE platform can provide highly secure access, leveraging a modern ZTNA service to implement zero trust principles for access to your critical infrastructure.

Banish bots from your Waiting Room and improve wait times for real users

With Cloudflare Waiting Room, you can safeguard your site from traffic surges by placing visitors in a customizable, virtual queue. Previously, many site visitors waited in the queue alongside bots, only to find themselves competing for inventory once in the application. This competition is inherently unfair, as bots are much faster and more efficient than humans. As a result, humans inevitably lose out in these high-demand situations, unable to secure inventory before bots sweep it all up.

Securing Datadog's cloud infrastructure: Our playbook and methodology

At Datadog, we build and operate a complex, self-managed infrastructure that spans multiple cloud providers and serves many customers in regulated environments. We need to secure this large, distributed infrastructure while maintaining strict uptime requirements and scaling our finite people resources. In this post, I’ll detail the playbook that we use on Datadog’s Cloud Security team for securing our infrastructure, including.

Optimize Wordpress performance with Cloudflare's Automatic Platform Optimization

Does your WordPress site load too slowly? Cloudflare’s Automatic Platform Optimization (APO) plugin caches and serves your site from a global network, making site loads up to 72% faster! APO allows Cloudflare to serve your entire WordPress site on its global edge network, and would take HTML and CSS that would not typically be cached on the CDN to be done so automatically.

Federal Zero Trust Maturity: From Backburner to Afterburner

Three years ago, the Federal Zero Trust Strategy promised that the government would learn and adjust as new technologies and practices emerge. That time is now. Let’s explore key innovations that advance Zero Trust maturity when your industry partner uses a federal-first approach. Watch this video to learn more.

Deliver Secure, Performant & Resilient Digital Citizen Services

Join Government Technology and Cloudflare for a live webinar where a panel of experts will explore how public sector agencies can leverage a platform-based approach to seamlessly navigate the shift to digital services—without compromising on efficiency, security, or simplicity.