Tag

Waf

Browsing

What do you do if you need to protect your website from XSS attacks? Most people patch it and get a WAF. This is common knowledge and there are plenty of places where you could go to get basic protection for your websites. From a free solution to solutions costing hundreds of thousands of dollars, most of them will claim they protect from OWASP Top 10 threats. So is there a real difference between WAFs?…

New Whitepaper On How Wallarm AI Works “Any sufficiently advanced technology is indistinguishable from magic,” Arthur C. Clarke Ever wanted to look under the covers of deep learning/artificial intelligence engine? While deep learning algorithms are generally based on neurons combined into a neural network and interacting with each other, just like in a human brain, to get good results with neural networks, it is critical to pick the right network topology, which has always been a difficult…

It’s all about security rules Stephen Hawking said, “Intelligence is the ability to adapt to change”. One could say much the same of web application firewalls and WAF security rules. With web applications now one of the most attacked components of IT infrastructures, organizations have a critical need to protect the systems and application programming interfaces they expose to the web. The stakes are high, including PCI-DSS compliance (or fines for non-compliance) for financial transactions, and…

Wallarm Next Gen WAF with threat verification delivers continuous application security for cloud workloads and enables security integration into CI/CD The technology partnership between Wallarm and AWS presents a promising opportunity for DevOps teams that use AWS infrastructure for their production workloads and want to incorporate application security into the application development and deployment processes. The collaboration between the two companies further supports the commitment from Wallarm to enable application security in the cloud. “Truckerpath chose…

When web based applications become important components of business IP, protecting these applications is a key part of doing business. Most of IT and DevOps professionals are not thinking whether they need a Web Application Firewall (WAF). Instead, they are trying to decide which WAF is right for them. We are going to look at several key factors in WAF selections. Deployment architecture There are two different ways to install WAF for the modern web:…

Wallarm is a pioneer security vendor in the NGINX Certified Module program and provides trusted and verified security functionality to NGINX Plus customers. As long-time friends and technology partners of NGINX, Wallarm has worked hard in collaborating with the NGINX’s team to make sure or solutions work well and perform at the speed of load balancer. [See our earlier guide on securing web applications with Wallarm and NGINX.] With the new Certified Module program, customers…