Best Practices for Automation in Cyber Security
 Automation has become a central component to growing and successful businesses. This holds true...
VIEW MOREMachine Learning in Cybersecurity – Demystifying Buzzwords & Getting to the Truth
Earlier this month, I had the opportunity to discuss the role of machine learning in security with...
VIEW MOREShifting DevOps Models and Their Impact on Application Security Tools and Strategies
While web application security has never been more advanced, one could argue that it has also never...
VIEW MORETop Cybersecurity Threats & How the WAF Must Evolve to Address Them
In this series of articles, we’ve been exploring the various ways that application security...
VIEW MOREFacing the Apache Struts Vulnerability with Confidence Using ThreatX
Last week, the Apache Software Foundation announced a new Apache Struts vulnerability...
VIEW MOREThe Rise of the Attacker-Centric Web Application Firewall (WAF)
In this series of blog posts, we have been analyzing the major forces that are reshaping the way...
VIEW MOREMarriott’s Costly Mistake: Letting Compliance Trump Security
Friday’s news of Marriott’s massive breach sent shock waves throughout the...
VIEW MOREThe New Age of Applications and What it Means for Security
The Modern Age of Applications Applications are the heart of most organizations. While you can...
VIEW MORE