- Category: Cloud Security (continued)
- Category: Compliance
- Building Security into Cloud Native Apps with NGINX
- Exploiting Oracle WebLogic by Remote Code Execution with a /console endpoint restricted
- How To Protect Your Kubernetes Cluster with Wallarm - part 1 of 3
- Security Challenges in FinTech - Discussion with Vandana Verma, OWASP
- SOC 2 Compliance During Covid-19 Times
- Tips for Securing Online Payments
- Why You Need to Use Rules in Your Yii2 Framework Models
- Category: DevOps
- 10 minutes to secure your Kubernetes application without giving up on customization: Wallarm WAF as a sidecar container with plain Kubernetes manifests
- Apache Solr 1,2,3,4 Kill-Chain.
- Blind SSRF exploitation
- Cybersecurity: What to Expect in the Year Ahead
- Exporting Nginx Access Logs to an ELK Cluster
- GHOST: A brief recap of what you need to know about it
- How to easily protect any Kubernetes application?
- How to protect web applications on Google Cloud Platform with WAF?
- How To Protect Your Kubernetes Cluster with Wallarm - Running in Production Mode – part 3 of 3
- How to secure your web applications with NGINX
- Neatly bypassing CSP
- New GigaOm Report: Path to DevOps Success
- NG-WAF vs old fashioned WAFs
- Protect your Helm chart bundled application with Wallarm WAF. 10-minutes configuration for continuous and enhanced security
- Race Condition in Web Applications
- Test and evaluate your WAF before hackers
- Risks involved with operatorAliases in Sequelize
- Yii2 Gii Remote Code Execution
- Category: Different attack types
- Category: FAST
- Category: Network Security
- Category: Owasp
- Category: Product updates