Detecting Malware/APT Through Automatic Log Analysis Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the… Fabio Palozza | May 23, 2018
HTTP Attacks HTTP traffic is dominating the internet. In fact, when people are asked about the internet, they are sometimes sure the… Lior Rozen | November 15, 2017
Web Performance Optimization: Treat Your Enterprise Apps Like E-Commerce Apps Shamus McGillicuddy is a Senior Analyst for EMA and is a featured guest blogger. Online retailers have understood the importance… Shamus McGillicuddy | October 7, 2015
The Internet has Upgraded to HTTP/2, but One Key Feature will Slow You Down Imagine a world where smartphones were only upgraded every 15 years. It is hard to imagine waiting that long for… Frank Yue | August 26, 2015