Benefits of placing WAF reverse proxy/transparent in front of web-based honeypots?

For my final year project, I wanted to do a comparative analysis of 2 WAF’s ModSec/Shadow Daemon and web-based honeypot SNARE/TANNER.

I wanted to find out if there are any benefits of placing WAF inline of a web-based honeypot. Does it de… Continue reading Benefits of placing WAF reverse proxy/transparent in front of web-based honeypots?

Azure AD Application Proxy Security Concerns + Azure Application Gateway (WAF) Better?

I am still new to security and still learning the basics so was interested in getting some feedback on two Azure services.

Edit: We are a school and the application’s host 4000+ parent and student records including medical records so secu… Continue reading Azure AD Application Proxy Security Concerns + Azure Application Gateway (WAF) Better?

The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

For those of us in the security industry, the annual Cyberthreat Defense Report is a gold mine of insights into the minds of IT security professionals, including what threats keep them up at night, and how they plan to defend against them. The 6th edit… Continue reading The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

Will We Ever See the End of Account Theft?

There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know that many users of websites are using the same passwords all over the internet;… Continue reading Will We Ever See the End of Account Theft?

Keeping Pace in the Race for Flexibility

Flexibility and elasticity. Both rank high on the corporate agenda in the age of digital transformation and IT is no exception. From the perspective of IT, virtualization and cloud computing have become the de facto standard for deployment m… Continue reading Keeping Pace in the Race for Flexibility

Automated WordPress Security & Protection with Sucuri

WordPress security is easy, when you have the right automated tools. When I started using WordPress I did all the site hardening myself, manually. WordPress security hardening is not difficult, especially if you have a background in web application sec… Continue reading Automated WordPress Security & Protection with Sucuri

How to Build an Azure Firewall in a Hub Virtual Network


Aidan shows you how to architect an Azure Firewall deployment where a centralized firewall will inspect many applications/services that are deployed into dedicated virtual networks (VNets).

The post How to Build an Azure Firewall in a Hub Virtual Network appeared first on Petri.

Continue reading How to Build an Azure Firewall in a Hub Virtual Network