Category: Application Security
Why Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MOREHow to Simplify WAF Rule Management
As long as web application firewalls (WAFs) have existed, security teams have struggled with tuning...
VIEW MORECredential Stuffing, DDoS Attacks, Bots, and More Create a Formidable Iceberg of Risk
Sometimes you see a threat coming and have time to prepare – like a forecasted hurricane....
VIEW MORERansomware Prevention: Beyond Phishing Awareness
As ransomware attackers seek ever-increasing payouts, they naturally want to maximize their spread...
VIEW MOREHow ThreatX Lowers False Positives, Delivers Visibility, and Speeds Time to Value
We talk to a lot of security professionals about web application security, and three...
VIEW MOREYour Best First Step in Building an Application Security Program
Application security is critical, and it’s complicated. To be successful, it requires...
VIEW MOREHow to Overcome Credit Union Cybersecurity Challenges
Credit unions have a unique set of cybersecurity challenges stemming from their size, mission, and...
VIEW MORENew Research: Bot and DDoS Attacks on the Rise
Cybersecurity is changing fast. Just glance at the breach headlines, and you’ll most certainly...
VIEW MOREReady for a WAF Alternative? Your Peers Are Too
Holy crap it’s a pain to use. Maybe I just didn’t absorb enough of the...
VIEW MOREA CISO, a VP of Engineering, and a Threat Hunter Walk Into a BBQ …
Security is tough. It’s a big job that’s always getting bigger. More...
VIEW MOREShift Left vs Shift Right Security Testing
Shift Left. No wait, shift right! No, LEFT… Oh no, you just got...
VIEW MOREIf all you have is a hammer…
…Everything looks like a nail. There are over a five billion unique user credentials...
VIEW MORE