- Category: API Security
- 340 weak JWT secrets you should check in your code
- 4 DevOps Strategies to Boost Your Security
- GraphQL Batching Attack
- A Match Made in the Clouds
- Securing GraphQL API
- An Analog Approach to Secure Operations in Kubernetes
- Why and how to disable introspection query for GraphQL APIs
- Application security through the lens of Cyberwar – One on One with Chris Kubecka
- Securing GraphQL. Part 1
- Choose the right ingress controller for your Kubernetes environment
- Defining Wallarm API-specific Rules
- Fetching Full-Text Alert Data with the Wallarm API
- Frenemy at the Gates: The Breaching
- Is Docker Swarm going to change how we do microservices APIs?
- Is Service Mesh right for your infrastructure?
- IT Security Infrastructure: 5 Tips to Solve API Security Issues
- Key Considerations in API security
- Latest Bypassing Techniques Beat SOAP/XML API Protection
- Make Sure Your Security Is Ready for the Holiday Shopping Sprees
- Meet JWT heartbreaker, a Burp extension that finds thousands weak secrets automatically
- OWASP API Top 10 Projects: Highlights and Overview
- Perimeter Breaches: The attack front you're losing
- PHP Remote Code Execution 0-Day Discovered in Real World CTF Exercise
- Protecting gRPC applications and APIs
- Putting Wallarm Management Console on a Fast Track
- Recent discoveries reveal high-risk PHP vulnerabilities
- TensorFlow Dataset API for increasing training speed of Neural Networks
- The most cited Wallarm researches in 2019
- WAF JSON decoding capability required to protect against API threats like CVE-2020-13942 Apache Unomi RCE
- WAF-Based Attacks & The Future of Security
- Wallarm connector to Apigee
- Wallarm launches Cloud WAF with the best-in-class API protection
- Wallarm Launches Support of Envoy Proxy/ Envoy API Protection
- What DevOps trends to follow (and what to ignore)
- What stealthy attacks are hiding in API data — and why do most WAF miss them?!
- XXE that can Bypass WAF Protection
- “Fire Danger Rating” on “High” in Security Climate
- Category: Cloud Security
- 8 Tips and Best Practices to Build a Solid Cloud Migration Strategy
- Autoscaling Wallarm Nodes in AWS, GCP, and Azure
- Cloudflare fixed an HTTP/2 smuggling vulnerability
- Comparing Wallarm WAF Module to a Generic WAF
- How To Protect Your Kubernetes Cluster with Wallarm - Configuration and Finetuning - part 2 of 3
- ON PREM vs. CLOUD Part 2
- ON PREM vs. CLOUD.
- Securing Cloud-Native Applications
- Security 101 for eCommerce Businesses
- Shift to Microservices: Evolve Your Security Practices & Container Security
- Visit Wallarm at Google Cloud Next
- Wallarm New Open Source Module and Kaggle Hackathon