Simplifying Back to School Security with SD-WAN and SD-Branch

School is back in session with the second busiest retail season of the year, and technology sales—along with digital subscriptions to applications and services—are predicted to show double-digit growth this fall. Students of all ages, from kindergarten to college, are buying iPads and laptops and subscribing to SaaS applications to better Continue Reading

Update: Google and Microsoft Cases: Know Where Your Data Is!

All the way back in February (where has the time gone?) I posted a blog, Threats to your Data in the Trump Age, where I outlined possible threats to your data, including a recent ruling against Google and a Microsoft case that was still in the court system. In early Continue Reading

Security Research News in Brief – May 2017 Edition

Welcome back to our monthly review of some of the most interesting security research publications. This month, let’s do a bit of crypto… Past editions: Rowhammer is an attack on DRAM, which consists in repeatedly accessing given rows of the DRAM to cause random bit flips in adjacent rows. Until now, the attack Continue Reading

Discovering GitLab’s Personas

Back in January, I explained why GitLab uses personas in product development. At the time, we were still in the process of discovering who GitLab’s personas were. To make sure that the needs and expectations of our users were met, we asked them to complete a survey to share their Continue Reading

How we built rate limiting capable of scaling to millions of domains

Back in April we announced Rate Limiting of requests for every Cloudflare customer. Being able to rate limit at the edge of the network has many advantages: it’s easier for customers to set up and operate, their origin servers are not bothered by excessive traffic or layer 7 attacks, the Continue Reading

Security Research News in Brief – April 2017 Edition

Welcome back to our monthly review of some of the most interesting security research publications. Previous edition: March 2017 Figure 1: Hacking a vacuum cleaner The authors hacked a vacuum cleaner, which, besides cleaning, also includes an embedded camera and microphone. The hack wasn’t easy because the vacuum wasn’t too Continue Reading