Tag

Enterprise Software Security

Browsing

Industries from hospitality to taxis/transportation and food delivery are being disrupted by new age companies like Airbnb, Uber and DoorDash that have a cloud-based software infrastructure as one of their main enablers. Why do all these new companies use cloud and what advantage does it give them? Unlike legacy competitors, innovators with new infrastructure can: Quickly scale and grow their customer baseSupport their business in different geographies and ensure availabilityEnsure convenience, with users accessing the…

Wallarm’s unique approach provides actionable insight that identifies and protects against real attacks and vulnerabilities. I’m excited to be part of the team that automates this for modern services and cloud-based applications.

Newly updated Wallarm Node images now natively support autoscaling capabilities in AWS, GCP, and Azure. Updated images are already available in cloud provider marketplaces and can rely on the native auto-scaling to adjust the number of nodes based on traffic, CPU load, and other parameters. What is Autoscaling? Many of our customers rely on autoscaling capabilities to horizontally scale their apps and APIs. Autoscaling mechanisms monitor your applications and automatically adjust capacity to maintain steady,…

Next week, local chapter of Information Systems Security Association (check them out at http://www.sv-issa.org) is organizing a focused security conference looking into the issues of securing end users, enterprise technologies and security processes. Come meet Wallarm to learn about trends and best practices in applications and API security. Learn about: Recent high profile security events and tools you need to protect your web applications How to incorporate security into DevOps operations and best practices Securing…

Grab a moment and catch Wallarm CEO Ivan Novikov at SyScan 360 which is about to start in hot Singapore. His talk on Key-value injections here! will be on the second day of the conference. This paper is continuation of memcached injections research presented at BlackHat USA 2014. The paper presents two main areas of research: input validation vulnerabilities at different key-value clients for popular platforms (c, java, lua, node.js, php, perl, python and ruby)…