Why Security Teams Need to Virtual Patch

Posted by Andrew Useckas | CTO on Jul 8, 2019 10:28:31 AM

We live in a world where new application security vulnerabilities are discovered daily. Additionally, the advent of botnets and crypto currency mining has increased the attractiveness of targets. There are two major techniques utilized by attackers to find vulnerable applications en masse:

  1. Run scanners against large portions of the Internet to look for common exploits, such as SQL injection, Remote Command Execution, etc. Virtually any poorly coded web application can be vulnerable to these attacks.

  2. Follow the security feeds for newly discovered vulnerabilities, create exploits and launch them against every public instance of the application. Well known platforms like Wordpress and Drupal are especially susceptible to such an attack.

There is little debate that the best place to fix security issues is within the application code itself. However, that is not always feasible given the time that is required.

Read More

Topics: Web, Application & Hybrid Cloud Security

2019 Application Security Priorities - Stats & Trends

Posted by Chris Brazdziunas on Jun 13, 2019 8:45:04 AM

Application security never fails to keep us on our toes. Between the continuous evolution of application frameworks and integrations, and the advancement of human and automated attackers, security teams must always be braced for change and new challenges. On a similar vein, if the trends from 2018 continue, web application attacks will remain the most successful hacked area of the enterprise. In fact, over 60% of actual breaches occurred through web applications.*

Read More

Topics: Web, Application & Hybrid Cloud Security

Flying Blind Into the Threat Visibility Gap

Posted by David Geer on Jun 4, 2019 6:57:00 AM

Data, data everywhere and yet there’s very little insight to inform the business on the true nature and severity of cyber threats. That’s the story at most organizations where traditional Web Application Firewalls (WAFs) fail to bring into focus the visibility into the mounting expanse of security data.

Read More

Topics: Web, Application & Hybrid Cloud Security

How and Why to Use APIs to Strengthen Your AppSec Strategy

Posted by Kelly Brazil | VP of Sales Engineering on May 13, 2019 12:15:00 PM

APIs are at the heart of modern applications and have quickly become a favorite target of attackers. And for good reason - they expose a wealth of functionality and attack surface that is often poorly defended. In our previous article we introduced the key building blocks of API security that can help ensure your APIs get the same level of protection as the web front-end of your application.

Read More

Topics: Web, Application & Hybrid Cloud Security

Strengthen Your Web App Defenses Using Behavioral Analysis and Attacker Deception

Posted by Bob Violino on May 7, 2019 9:27:00 AM

For many enterprises today, Web and cloud applications are critical components of the business. And for the ever-increasing number of companies conducting business online, they are the business. 

Read More

Topics: Web, Application & Hybrid Cloud Security

Top API Security Challenges and How to Address Them Today

Posted by Kelly Brazil | VP of Sales Engineering on Apr 29, 2019 8:27:56 PM

APIs have altered the attack surface of modern applications and exposed new gaps in security in the process. In the old days, virtually all application traffic passed through the web front-end of an application, and unsurprisingly that is where security efforts were focused. APIs have quickly and thoroughly eroded this basic assumption.

Read More

Topics: Web, Application & Hybrid Cloud Security

Web Application Firewalls 101 - Keywords to Bookmark

Posted by Mackenzie Jacobson on Apr 25, 2019 4:05:00 AM

Web security is not a new concept. From the dawn of the Internet, cyber criminals have been experimenting with and mastering ways to exploit the data housed within online properties. And as businesses increasingly transition online, the volume of attacks has skyrocketed. According to a recent study,* the number of new vulnerabilities per month exceeded 17,000 in 2018. That’s nearly a 23% increase from 2017. From 10-person startups to thousand-person enterprises, cyber threats are an equally legitimate concern (or at least they should be). Arm yourself with the tools you need to protect your business from malicious attacks (automated or not). The first step is familiarizing yourself with the keywords/terms used most frequently in the application security space.

The following post details, alphabetical order, the first 10 keywords:

Read More

Topics: Web, Application & Hybrid Cloud Security

Automation - Business Ally and Security Adversary?

Posted by Will Woodson | Lead Security Engineer on Apr 15, 2019 9:33:38 AM

In a world where speed and agility is expected by consumers and required for business operations, automation has become key component of successful enterprise operations, from identity and access management to patching. But it goes beyond that. Automation has enabled many security teams to transfer maintenance burdens and manual tasks from security teams to applications, which in turn, frees skilled human workers to focus their energy on strategic initiatives. Unfortunately, that's not the end of the story. Without proper parameters, automation can actually introduce critical security vulnerabilities and serve more as an adversary than an ally. 

Read More

Topics: Web, Application & Hybrid Cloud Security

ThreatX Labs - Blog

Arm yourself with information and insights on the latest cybersecurity trends to defend against today's most advanced cyber criminals with articles from the leader in SaaS-based web application firewall solutions.

Subscribe Here!

Recent Posts

Follow Me