Search by topic, company, or concept and scan results quickly.
Why it matters: Engineers building AI agents can now handle network errors programmatically and cost-effectively. By replacing verbose HTML with structured data, Cloudflare enables agents to make deterministic decisions like exponential backoff while slashing operational token costs by 98%.
Why it matters: AI apps introduce probabilistic attack surfaces like prompt injection that traditional WAFs can't stop. Cloudflare's GA release provides automated discovery and specialized guardrails to secure LLM endpoints and agents without requiring model-specific integrations.
Why it matters: This shift transforms AI from a chat interface into programmable infrastructure. By embedding execution engines into apps, developers can build resilient, context-aware systems that handle complex multi-step tasks without brittle, hard-coded logic or custom orchestration layers.
Why it matters: Security teams are overwhelmed by data noise. This architecture demonstrates how to transform massive telemetry into prioritized, actionable insights using a distributed system of specialized microservices, reducing incident response times and closing critical configuration gaps.
Why it matters: Engineers need holistic visibility to combat multi-vector attacks. By centralizing edge telemetry and Zero Trust events, teams can correlate disparate signals, significantly reducing detection time and improving forensic accuracy without managing complex log pipelines.
Why it matters: This integration automates the discovery of shadow IT and unprotected assets, allowing engineers to close security gaps before exploitation. By combining outside-in scanning with immediate remediation via Cloudflare's proxy, teams can maintain a robust security posture at scale.
Why it matters: This system demonstrates how to transform massive, fragmented telemetry into actionable insights. By standardizing health metrics and isolating analytics from production, engineers can proactively identify risks, reduce support overhead, and ensure platform stability at a petabyte scale.
Why it matters: It demonstrates how to implement privacy-preserving security features in end-to-end encrypted environments. Engineers can learn how to balance cryptographic privacy primitives like PIR and OPRF with the practical performance requirements of large-scale real-time messaging.
Why it matters: As AI agents integrate into CI/CD, they introduce risks like prompt injection and credential theft. This architecture provides a blueprint for running non-deterministic agents safely within trusted environments by enforcing strict isolation, secret redaction, and governed execution.
Why it matters: Traditional security tools miss logic-based vulnerabilities like BOLA because the requests appear valid. This stateful scanner allows engineers to proactively hunt for authorization flaws, ensuring business logic integrity beyond simple schema validation and signature matching.