So, what lies ahead? Let’s turn over our virtual coffee cups and read the coffee grounds. …. report also shows that as many as 60% of all hacker attacks are using a compromised web application to gain unauthorized access or steal data.
With recent explosion of Kubernetes adoption and Wallarm’s consistent effort to deliver Kubernetes native security offerings, I feel tremendous confidence in our collective ability to stay ahead of the emerging threats in the cloud native ecosystem.
There is an update in the Wallarm Console, which presents a brand new dashboard that can’t be missed. There are three…
There is a new attack surface when the app tech stack includes GraphQL. It’s Batched Attacks on GraphQL APIs. How can these apps be protected? Read more to find out.
Intro In the last post, we touched on the topic of GraphQL security. As a reminder, GraphQL is a popular…
Wallarm can protect North-South API in the applications that use Envoy as an alternative Ingress controller at the front end of a Kubernetes cluster. Wallarm can also protect edge traffic and also East-West Envoy API for Service-Mesh and Istio.
Andrew Jenkins of Aspen Mesh identifies three deployment options with regards to how a Service Mesh delivers its services:
- As a sidecar that runs alongside your microservice container
- As a library that can be built into each of the microservices
- As an agent that sit in the container infrastructure and provide the service to all the containers on that node
we need to kick out the solutions that are no longer functioning to give ample room for the advanced WAF solutions. Join us in this discussion.
Even web application APIs can be subject to race conditions. Check out where it can happen such as the cases of HTTP pipelining, splitting HTTP and others.
Traditional WAFs speak to bigger adoption problems for technologists, innovators, and businesses. Making a decision in today’s marketplace is like…