Simplifying Back to School Security with SD-WAN and SD-Branch

School is back in session with the second busiest retail season of the year, and technology sales—along with digital subscriptions to applications and services—are predicted to show double-digit growth this fall. Students of all ages, from kindergarten to college, are buying iPads and laptops and subscribing to SaaS applications to better Continue Reading

Speed up your ROS snap builds

A while back I wrote a post about distributing a ROS system among multiple snaps. If you want to enable some sort of add-on story, you need to have multiple snaps, and that remains the way to do it today with ROS. That approach works, but I’ll be the first Continue Reading

Update: Google and Microsoft Cases: Know Where Your Data Is!

All the way back in February (where has the time gone?) I posted a blog, Threats to your Data in the Trump Age, where I outlined possible threats to your data, including a recent ruling against Google and a Microsoft case that was still in the court system. In early Continue Reading

Call Flow Designer Release Candidate Available

Along with the release of V15.5 we brought back the VAD, with it’s new name Call Flow Designer (CFD). The BETA of the CFD was very well received as it was a feature that many customers and resellers were really looking forward to. And now we bring to you the Continue Reading

Security Research News in Brief – May 2017 Edition

Welcome back to our monthly review of some of the most interesting security research publications. This month, let’s do a bit of crypto… Past editions: Rowhammer is an attack on DRAM, which consists in repeatedly accessing given rows of the DRAM to cause random bit flips in adjacent rows. Until now, the attack Continue Reading

Discovering GitLab’s Personas

Back in January, I explained why GitLab uses personas in product development. At the time, we were still in the process of discovering who GitLab’s personas were. To make sure that the needs and expectations of our users were met, we asked them to complete a survey to share their Continue Reading

How we built rate limiting capable of scaling to millions of domains

Back in April we announced Rate Limiting of requests for every Cloudflare customer. Being able to rate limit at the edge of the network has many advantages: it’s easier for customers to set up and operate, their origin servers are not bothered by excessive traffic or layer 7 attacks, the Continue Reading

Security Research News in Brief – April 2017 Edition

Welcome back to our monthly review of some of the most interesting security research publications. Previous edition: March 2017 Figure 1: Hacking a vacuum cleaner The authors hacked a vacuum cleaner, which, besides cleaning, also includes an embedded camera and microphone. The hack wasn’t easy because the vacuum wasn’t too Continue Reading

>