Ep. 026 – Android bloatware, hackable routers and website attacks [PODCAST]
Here’s our latest podcast – enjoy! Continue reading Ep. 026 – Android bloatware, hackable routers and website attacks [PODCAST]
Collaborate Disseminate
Here’s our latest podcast – enjoy! Continue reading Ep. 026 – Android bloatware, hackable routers and website attacks [PODCAST]
For my final year project, I wanted to do a comparative analysis of 2 WAF’s ModSec/Shadow Daemon and web-based honeypot SNARE/TANNER.
I wanted to find out if there are any benefits of placing WAF inline of a web-based honeypot. Does it de… Continue reading Benefits of placing WAF reverse proxy/transparent in front of web-based honeypots?
I am still new to security and still learning the basics so was interested in getting some feedback on two Azure services.
Edit: We are a school and the application’s host 4000+ parent and student records including medical records so secu… Continue reading Azure AD Application Proxy Security Concerns + Azure Application Gateway (WAF) Better?
For those of us in the security industry, the annual Cyberthreat Defense Report is a gold mine of insights into the minds of IT security professionals, including what threats keep them up at night, and how they plan to defend against them. The 6th edit… Continue reading The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]
There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know that many users of websites are using the same passwords all over the internet;… Continue reading Will We Ever See the End of Account Theft?
For those who use Web Application Protector from Akamai: "Your APIs just got an extra layer of protection". Continue reading Automated API Protection with WAP
Flexibility and elasticity. Both rank high on the corporate agenda in the age of digital transformation and IT is no exception. From the perspective of IT, virtualization and cloud computing have become the de facto standard for deployment m… Continue reading Keeping Pace in the Race for Flexibility
WordPress security is easy, when you have the right automated tools. When I started using WordPress I did all the site hardening myself, manually. WordPress security hardening is not difficult, especially if you have a background in web application sec… Continue reading Automated WordPress Security & Protection with Sucuri
We have a record tracking application behind WAF. Everytime end users submit a record with special chars such as ‘ or ” or () it blocks it as SQLi even when the payload is completely benign.
At the moment we have tuned char… Continue reading WAF tuning for SQLi
Aidan shows you how to architect an Azure Firewall deployment where a centralized firewall will inspect many applications/services that are deployed into dedicated virtual networks (VNets).
The post How to Build an Azure Firewall in a Hub Virtual Network appeared first on Petri.
Continue reading How to Build an Azure Firewall in a Hub Virtual Network