Category: Application Security
Using the Web App Kill Chain to Identify & Neutralize Threats
There is an ongoing debate among security professionals surrounding the most effective ways to...
VIEW MOREHow to Adequately Account for and Secure IoT Devices
In a world that is increasingly fast-paced, continuously evolving, and especially competitive, the...
VIEW MOREIoT Cloud Portals – A Modern Day Hacker’s Keys to the Kingdom
It seems that nearly every week, another IoT related security story is in the news. While most of...
VIEW MOREShifting DevOps Models and Their Impact on Application Security Tools and Strategies
While web application security has never been more advanced, one could argue that it has also never...
VIEW MORETop Cybersecurity Threats & How the WAF Must Evolve to Address Them
In this series of articles, we’ve been exploring the various ways that application security...
VIEW MORE3 Hurdles Security Will Need to Clear to Succeed in a DevOps World
Historically, there has been no love lost between software developers and security teams. Dev teams...
VIEW MOREToo Little Too Late: ThreatX Predicts Cyber Vulnerabilities Will Go Largely Unaddressed…with Dire Consequences
It’s hard to believe, but the New Year is nearly upon us. 2018 was a busy year for...
VIEW MOREThe Rise of the Attacker-Centric Web Application Firewall (WAF)
In this series of blog posts, we have been analyzing the major forces that are reshaping the way...
VIEW MOREThe New Age of Applications and What it Means for Security
The Modern Age of Applications Applications are the heart of most organizations. While you can...
VIEW MOREToo Busy Tuning Your WAF to Realize You Don’t Have To?
Over the past few years, web and application development has undergone a considerable change. Not...
VIEW MORETightly Coupling Applications and Security for Infinite Scale
Let’s talk about the future of application security. For those of us who have been designing...
VIEW MORE5 Negative Impacts of Misaligned Security Strategies
It’s no secret that the frequency and intensity of data breaches is growing at an exponential...
VIEW MORE