Intro In the last post, we touched on the topic of GraphQL security. As a reminder, GraphQL is a popular alternative to REST APIs. A single article can not encapsulate all the things one wants to know about such an interesting technology. This installment of the series will look at the first step of analyzing how well GraphQL is protected, specifically securing the GraphQL schema by disabling introspection query which is enabled by default. What…
Wallarm can protect North-South API in the applications that use Envoy as an alternative Ingress controller at the front end of a Kubernetes cluster. Wallarm can also protect edge traffic and also East-West Envoy API for Service-Mesh and Istio.
Andrew Jenkins of Aspen Mesh identifies three deployment options with regards to how a Service Mesh delivers its services:
- As a sidecar that runs alongside your microservice container
- As a library that can be built into each of the microservices
- As an agent that sit in the container infrastructure and provide the service to all the containers on that node
we need to kick out the solutions that are no longer functioning to give ample room for the advanced WAF solutions. Join us in this discussion.
Even web application APIs can be subject to race conditions. Check out where it can happen such as the cases of HTTP pipelining, splitting HTTP and others.
Traditional WAFs speak to bigger adoption problems for technologists, innovators, and businesses. Making a decision in today’s marketplace is like…
GraphQL is an alternative to the REST concept that allows working with the data in a more structured and object-oriented…
The real cost of a security breach to your business is larger than many imagine. On the surface there is incredible expensive to recovering from breaches. What is often also at risk is the inestimable damage to company morale, brand reputation, and operations.
Understand how e-commerce transactions work, what a payment gateway is, and how to keep your online payments secure. Online businesses mean even more reliance of customer trust, which means higher security.
Kubernetes is becoming a common enough word, but what is it, how does it benefit your world, and how does it work?