Tag

Application Security Testing

Browsing

Testing the security of the corporate applications is a part of every-day life for Ops and DevOps professionals. Larger companies have whole teams dedicated to independent security testing, called Red Teams. These folks use various tools at their disposal to discover the flaws in both applications and infrastructure. These teams often take the same approach as pen testers — external contractors that are hired to penetrate the company defences. More recently, many companies are supplementing their internal…

We’ve just released a couple of features we’re really excited about Live Threat Verification results The Active Threat Verification component was always a unique feature of Wallarm. Having the ability to replay the attack/payload against the application (or its staging environment) gives our customers unique insights into critical events when an attacker identifies exploitable security issues. With this new improvement to the UI, you can now see a real-time view of the process of threat verification.…

When web based applications become important components of business IP, protecting these applications is a key part of doing business. Most of IT and DevOps professionals are not thinking whether they need a Web Application Firewall (WAF). Instead, they are trying to decide which WAF is right for them. We are going to look at several key factors in WAF selections. Deployment architecture There are two different ways to install WAF for the modern web:…