Category

Cloud Security

Category

Here are eight fool-proof practices that can help you move your workloads to the cloud. https://commons.wikimedia.org/wiki/File:Cloud_computing.svg A quick look at cloud migration. Cloud migration involves moving an organization’s data storage and IT operations to a cloud network. Cloud computing services are hosted in a multi-tenant environment and can be delivered via the internet or direct connection. The main types of cloud services are software as a service (SaaS), in which a subscription grants access to…

April 9–11, San Francisco, CA We are excited to join the community of the GCP professionals and demonstrate Wallarm web and API protection solutions custom-built for Google Cloud-powered applications. A certified GCP-partner, Wallarm delivers AI-powered security solution built to help your business migrate to Google cloud and grow your infrastructure with DevSecOps in mind. Visit Wallarm on the floor of #GoogleNext19 or in our dedicated demo suite. We have great gifts, product information, and friendly…

We’re going to look at the security vulnerabilities that face eCommerce at high-traffic times. It’s just before a big sale or holiday shopping season kicks off. Are you ready to ride the waves of a Category 5 surge in sales or will hanging-10 dreams become an e-com nightmare? Cybercriminals love a great sale. There will be a notable spike in shopping as people rush to take advantage of the deals and bargains available on events like…

A key element of any security solution, whether its a WAF, NGWAF, RASP or even a SIEM or a classic IDS, is the ability to correctly detect whether an incoming API request is malicious. The traditional way to do it is using signatures and regular expressions (regex). Some sets of signatures are open-sourced such as Core Rule Set, others are commercial sources of signatures. Although wide-spread, classifying inputs with the help of signatures is not…

Security and Other considerations. Part 2 By Johan Nordstrom To be able to keep up with the development of new security threats, companies need to rethink their security strategies. The basics must be to decrease complexity and use automated solutions when possible. There has been a change in the balance. In the past, attacks and defenses were somewhat in balance in the sense that hackers manually hacked their way into companies and the targeted organizations security…

Security and Other considerations. Part 1 By Johan Nordstrom The only constant in this world is change, and these days it’s coming quicker and faster than ever before, as is evident in the explosive market for cloud services. A recent research and analysis from Cisco showed that the global internet traffic to and from different cloud services has been growing at a rate of 30 percent each year. So whether you like it or not, the…