Bot Manager vs. WAF: Why You Actually Need Both

Over 50% of web traffic is comprised of bots, and 89% of organizations have suffered attacks against web applications. Websites and mobile apps are two of the biggest revenue drivers for businesses and help solidify a company’s reputation with t… Continue reading Bot Manager vs. WAF: Why You Actually Need Both

How to (Securely) Share Certificates with Your Cloud Security Provider

Businesses today know they must handle sensitive data with extra care. But evolving cyber threats combined with regulatory demands can lead executives to hold their proverbial security cards close to their chest. For example, they may be reluctant to … Continue reading How to (Securely) Share Certificates with Your Cloud Security Provider

F5 Networks Acquires NGINX For $670 Million

One of the most important software companies NGINX, which is also behind the very popular open-source web server of the same name, is being acquired by its rival, F5 Networks, in a deal valued at about $670 million.

While NGINX is not a name that you … Continue reading F5 Networks Acquires NGINX For $670 Million

How to Deploy a Graylog SIEM Server in AWS and Integrate with Imperva Cloud WAF

Security Information and Event Management (SIEM) products provide real-time analysis of security alerts generated by security solutions such as Imperva Cloud Web Application Firewall (WAF). Many organizations implement a SIEM solution to bring visibili… Continue reading How to Deploy a Graylog SIEM Server in AWS and Integrate with Imperva Cloud WAF

Automated WordPress Security & Protection with Sucuri

WordPress security is easy, when you have the right automated tools. When I started using WordPress I did all the site hardening myself, manually. WordPress security hardening is not difficult, especially if you have a background in web application sec… Continue reading Automated WordPress Security & Protection with Sucuri

How to Build an Azure Firewall in a Hub Virtual Network


Aidan shows you how to architect an Azure Firewall deployment where a centralized firewall will inspect many applications/services that are deployed into dedicated virtual networks (VNets).

The post How to Build an Azure Firewall in a Hub Virtual Network appeared first on Petri.

Continue reading How to Build an Azure Firewall in a Hub Virtual Network

What To Consider when Building Your Azure Firewall Design


Aidan explains what you need to consider when planning for a deployment of the Azure Firewall.

The post What To Consider when Building Your Azure Firewall Design appeared first on Petri.

Continue reading What To Consider when Building Your Azure Firewall Design

James Wickett, Signal Sciences – Enterprise Security Weekly #115

James Wickett is the Head of Research at Signal Sciences. James talks about how security is moving to the application space and web applications. WAFs may seem tedious but they are necessary to allow developers to focus on other things. Full Show Notes… Continue reading James Wickett, Signal Sciences – Enterprise Security Weekly #115

Credential Stuffing Campaign Targets Financial Services

Over the last few weeks, Radware has been tracking a significant Credential Stuffing Campaign targeting the financial industry in the United States and Europe. Background Credential Stuffing is an emerging threat in 2018 that continues to accelerate a… Continue reading Credential Stuffing Campaign Targets Financial Services

Using Application Analytics to Achieve Security at Scale

Are you overwhelmed by the number of security events per day? If so, you are not alone. Alert Fatigue is Leaving You Exposed It is not uncommon for security administrators to receive tens of thousands of security alerts per day, leading to alert fatig… Continue reading Using Application Analytics to Achieve Security at Scale