Category

Network Security

Category

Greetings, dear scholarship recipients! Applications for the scholarship draw should have closed on September 31st, but we are still receiving applications from you. At the moment there were 148 applications and only 3 people managed to submit them in time, now they are sent to our technical specialists for checking. My first impression of the 3 essays turned in is that 2 are definitely failures and 1 looks better. When we announced this scholarship, we…

Security probably would not be too interesting to you at all if you were a liquor store, restaurant, or work in similar sectors of the economy. However, security should definitely be a front-row concept if you are a start-up in the technology space or a business that depends on technology for success. Generally, suppose you are running a B2B (Business to Business) organization or a B2C (Business to Consumer) where you have to interact with…

The Wallarm WAF provides an organization with the ability to protect their applications and APIs against a wide range of attacks. However, an organization may wish to achieve a greater degree of visibility into attack traffic and alerts than is possible via the Wallarm user interface. The Wallarm Nginx-based WAF nodes provide protection against a wide variety of threats to an organization’s systems. However, it is not possible to perform a full-text search of alert…