How to configure BurpelFish

I recently was doing a pentest and was continuously looking up translations for words, and thought “there has to be a better way…”. That is when I landed on BurpelFish, which adds a google translate context option to your BurpSuite’s right click. When … Continue reading How to configure BurpelFish

Application security tools ineffective against new and growing threats

A study by Fastly and ESG, based on insights from information security and IT professionals representing hundreds of organizations globally, revealed growing concerns around adequately securing the rapidly rising number of mission-critical cloud servic… Continue reading Application security tools ineffective against new and growing threats

Why Should You Audit Your Website for Security?

Just a cursory look at the cybersecurity statistics will show that data breaches are sky-rocketing year on year. Even organizations that have made investments in website security and follow all.
The post Why Should You Audit Your Website for Security? … Continue reading Why Should You Audit Your Website for Security?

Gaining Insights Is Fundamental for API Security

As enterprises continue their digital transformation journey in this Post-COVID era, applications are the engine that drives their business growth. Whether it’s a digital-first enterprise or one that is accelerating its digital transformation initiativ… Continue reading Gaining Insights Is Fundamental for API Security

Imperva’s WAF Gateway 14.4 Protects Enterprises for the Post-COVID Era

Whether it’s called the New Normal or Next Normal era, COVID-19 has impacted all businesses worldwide and accelerated their digital transformation initiatives during this new post-pandemic era. Whether it’s from a recent retail trend like omnichannel c… Continue reading Imperva’s WAF Gateway 14.4 Protects Enterprises for the Post-COVID Era

DevOps didn’t kill WAF, because WAF will never truly die

The web application firewall (WAF) is dead, they say, and DevOps is the culprit, found over the body in the server room with a blade in its hand and splattered code on its shirt. But although some could argue that DevOps had the means, motive, and oppo… Continue reading DevOps didn’t kill WAF, because WAF will never truly die

Achieving PCI DSS Compliant Firewalls within a Small Business

The most important and integral part of any data security begins with having firewalls installed in the environment. Not just that, installing firewalls is an essential requirement of the Payment Card Industry Data Security Standard (PCI DSS). However… Continue reading Achieving PCI DSS Compliant Firewalls within a Small Business

Benefits of Building a Multi-prong Mousetrap for WAF Policies with ML

The reason behind buying a market-leading Web Application Firewall (WAF) is to protect your website and web applications from malicious attacks, plus complying with industry or regional data and privacy standards. In addition to the typical OWASP Top 1… Continue reading Benefits of Building a Multi-prong Mousetrap for WAF Policies with ML

Which is more Important: Vulnerability Scans Or Penetration Tests?

Which Is Better? A Vulnerability Scan Or A Penetration Test?

Vulnerability scanning and penetration tests are two very different ways to test your system for any vulnerabilities. Despite this, they are often confused about the same service,… Continue reading Which is more Important: Vulnerability Scans Or Penetration Tests?

12 Crucial Components Required to Conduct a Satisfactory Web Application Security Assessment

Application Security Assessment is a comprehensive assessment of the security posture of an organization. Web application security assessment is an ongoing process; not a once-a-year event or a compliance formality..
The post 12 Crucial Components Requ… Continue reading 12 Crucial Components Required to Conduct a Satisfactory Web Application Security Assessment