Tag

Cloud Computing

Browsing

To my knowledge, the first reference to the idea and principles of signatures for detecting network attacks dates back to 1987. This was a scientific paper by Dorothy E. Denning from Stanford Research Institute (SRI) (Here’s the link to the paper). According to the publication’s records, it was sent to the editors in 1985, but was published almost two years later(Manuscript was received December 20, 1985; revised August 1, 1986). This work was supported by…

This article is written specifically for web developers who use a module. We will tell you how we got access to sensitive data on a staging server through Yii2 Gii Remote Code: First to the testing environment, and then to the production. Spoiler: We have notified the module developer about the problem and it will be fixed soon. A temporary patch is available on GitHub. Gii is a module used to automatically generate code that…

Since 1991, Web Application Firewall, commonly referred to as WAF, has become one of the most common application security technologies available on the market. Since the last century, WAFs have evolved by incorporating the cloud and using Machine Learning instead of RegExp. Currently, few technologies, such as NG-WAF, RASP, WAAP, and a few others, have internal WAF capabilities, which prevent web applications and API threats. Majority of the fintech, health tech, and e-commerce companies have…

Here are eight fool-proof practices that can help you move your workloads to the cloud. A quick look at cloud migration. Cloud migration involves moving an organization’s data storage and IT operations to a cloud network. Cloud computing services are hosted in a multi-tenant environment and can be delivered via the internet or direct connection. The main types of cloud services are software as a service (SaaS), in which a subscription grants access to a…

Wallarm is excited to announce the native availability of Wallarm node on Azure. While in the past Wallarm customers in Azure environment had to install Wallarm nodes as dynamic modules (manually) into their Azure instances with NGINX, the new release allows deployment from a pre-configured image from the Azure marketplace. Wallarm’s release on Azure marketplace comes at an opportune time for businesses exploring a diversified environment or expanding their DevOps infrastructure into Azure. Wallarm’s NG…

Promoting Open Source Communities & Kubernetes Security To keep pace with the rapid innovation of a global network of attackers, cybersecurity relies on collaboration. Open source communities are a vital part of that engine of good. We actively contribute to a number of open source efforts related to cybersecurity and machine learning. Wallarm is a proud member of the Linux Foundation and its sister organization, Cloud Native Computing Foundation (CNCF), Libdetection Project, and other open…