The Not-So Odd Couple of DDoS and WAF As the saying goes in the real world, “necessity is the mother of invention.” However, those of us that work Ben Desjardins |June 21, 2016
Cover Your Bases to Protect Your Organization From Advanced Threats Organizations can protect themselves against advanced threats by adopting the right strategy. This strategy involves getting the right players on RussellWarren |June 15, 2016
DevOps and Security: Yes We Can Airlines, retailers, travel service providers, banks, marketplaces, and social media – all rely on their web applications to generate revenues Ron Meyran |May 19, 2016
Why WAF & DDoS – A Perfect Prearranged Marriage - #2 David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.In previous blogs I have David Monahan |April 06, 2016
How Integrating Application Delivery and a Firewall is like Auto Repair I took my car in for some work a while back. They had to replace a gasket on the engine Frank Yue |January 12, 2016
5 Reasons Why Virtual Machine Security Could Become a Larger Threat The recent Venom Vulnerability has been open since 2004. The ShellShock Vulnerability released last year was open for 25 years! David Hobbs |June 10, 2015
Protecting Your Applications Everywhere – Are You in Good Hands? Cloud migration – one of the top trends this past year and predicted by many to be a top trend Shira Sagiv |April 28, 2015
The Road to Cyber-Safety is Shifting to Hybrid Cloud WAF Protection Hybrid Cloud WAF is the answer. Now what was the question?Let’s back up a minute. There is an ancient riddle Michael Groskop |April 20, 2015
The Security Concerns of SSL/TLS Encrypted Traffic Secure Sockets Layer (SSL) and Transport Layer Security (TLS) sites are used today to secure transactions on banking sites, health Raj Vadi |March 30, 2015