Imperva’s WAF Gateway 14.4 Protects Enterprises for the Post-COVID Era

Whether it’s called the New Normal or Next Normal era, COVID-19 has impacted all businesses worldwide and accelerated their digital transformation initiatives during this new post-pandemic era. Whether it’s from a recent retail trend like omnichannel c… Continue reading Imperva’s WAF Gateway 14.4 Protects Enterprises for the Post-COVID Era

DevOps didn’t kill WAF, because WAF will never truly die

The web application firewall (WAF) is dead, they say, and DevOps is the culprit, found over the body in the server room with a blade in its hand and splattered code on its shirt. But although some could argue that DevOps had the means, motive, and oppo… Continue reading DevOps didn’t kill WAF, because WAF will never truly die

Achieving PCI DSS Compliant Firewalls within a Small Business

The most important and integral part of any data security begins with having firewalls installed in the environment. Not just that, installing firewalls is an essential requirement of the Payment Card Industry Data Security Standard (PCI DSS). However… Continue reading Achieving PCI DSS Compliant Firewalls within a Small Business

Benefits of Building a Multi-prong Mousetrap for WAF Policies with ML

The reason behind buying a market-leading Web Application Firewall (WAF) is to protect your website and web applications from malicious attacks, plus complying with industry or regional data and privacy standards. In addition to the typical OWASP Top 1… Continue reading Benefits of Building a Multi-prong Mousetrap for WAF Policies with ML

Which is more Important: Vulnerability Scans Or Penetration Tests?

Which Is Better? A Vulnerability Scan Or A Penetration Test?

Vulnerability scanning and penetration tests are two very different ways to test your system for any vulnerabilities. Despite this, they are often confused about the same service,… Continue reading Which is more Important: Vulnerability Scans Or Penetration Tests?

12 Crucial Components Required to Conduct a Satisfactory Web Application Security Assessment

Application Security Assessment is a comprehensive assessment of the security posture of an organization. Web application security assessment is an ongoing process; not a once-a-year event or a compliance formality..
The post 12 Crucial Components Requ… Continue reading 12 Crucial Components Required to Conduct a Satisfactory Web Application Security Assessment

Web Application Security’s Lost Year

It’s been over a year now since everything shut down. As we enter into the second spring of the pandemic, organizations are able to better evaluate what worked and what didn’t as they unexpectedly transitioned to remote work. One area that suffered wa… Continue reading Web Application Security’s Lost Year

Even though critical, web application security is getting less attention

As organizations shifted focus to support remote work and business continuity amid the challenges of 2020, web application security suffered, according to an Invicti Security report. Between 2016 and 2019, the number of high-severity and medium-severit… Continue reading Even though critical, web application security is getting less attention

Penetration testing: A yearly physical for your applications

Regardless of your company’s maturity level, penetration testing should be conducted annually to understand the health of your applications.
The post Penetration testing: A yearly physical for your applications appeared first on Software Integrity Bl… Continue reading Penetration testing: A yearly physical for your applications

Next-Gen WAF protection for recent Microsoft Exchange vulnerabilities

Protecting our customers Our security research team has built and deployed a rule to protect Fastly’s Signal Sciences Next-Gen WAF customers against the recently announced Microsoft Exchange Server vulnerabilities. The custom rule is available in the c… Continue reading Next-Gen WAF protection for recent Microsoft Exchange vulnerabilities