Cloud-native insight

A couple reasons why BlackHat is cool

It was hot in Vegas in the first half of August not only because of the 100-degree-Farenheit heat, but because there were several security conferences happening at the same time! Wallarm was the silver sponsor of BlackHat this year, and this is why that’s cool: The scale is really impressive. It seems like we’ve never before...
Read More

Greetings from Blackhat 2014

Good Morning all. We’re coming to you live from Blackhat here in intensely warm Las Vegas. Wallarm is be exhibiting at our booth #564, giving away free demos and web application security tips, so don’t miss your chance to meet us in person! Also, Ivan Novikov, CEO of Wallarm, give a talk about new type of...
Read More

Wallarm Honored Among the Best Security Startups in Europe

The Europas Awards, held in London, honor the best tech startups in Europe. While the Europas concentrate on the newest companies on the scene, the event also brings together mid and late stage technology startups. We were happy to find ourselves on the shortlist of Best Security/Privacy Startups, which appeared this year for the first time....
Read More

We support student CTF teams

The worldwide CTF community continues to thrive. Many of the organizers of online qualifiers are also holding amazing offline finals in many different cities and countries around the world. This allows participants not only to have a chance at claiming winning places but also to see the world and meet new, interesting people — a real adventure. Alas,...
Read More

Wallarm at NGINX User Summit

Last week we’ve visited the first NGINX User Summit and were lucky to give a lightning talk about Wallarm there. The event took place at Dogpatch Studios in San Francisco and gathered about a hundred people. It started with a crash course on NGINX fundamentals and continued with an overview of NGINX history and future roadmap...
Read More

Timing Attacks Against File Systems

Time is one of the key parameters in a pentester’s work. It can either interfere with security analysis efforts by reminding you about the deadline and an eager client, or help you out when performing an audit. How? Take for example the database data extraction technique based on measuring server reply times that’s used in blind...
Read More
1 23 24 25
Show Buttons
Hide Buttons