Category: Application Security
Cyberattacks in 2022 Will Look Familiar
We’re wrapping up another year and facing the inevitable questions of, what do you predict will...
VIEW MORELog4j2 Vulnerability Mitigation at ThreatX
On December 9, 2021, a vulnerability was reported in Log4j2, an open source tool widely used by...
VIEW MOREGrinch Bots Wreaking Havoc This Holiday Season
We’re right in the midst of the biggest online shopping days of the year. Add...
VIEW MOREWhy Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MOREHow to Simplify WAF Rule Management
As long as web application firewalls (WAFs) have existed, security teams have struggled with tuning...
VIEW MORECredential Stuffing, DDoS Attacks, Bots, and More Create a Formidable Iceberg of Risk
Sometimes you see a threat coming and have time to prepare – like a forecasted hurricane....
VIEW MORERansomware Prevention: Beyond Phishing Awareness
As ransomware attackers seek ever-increasing payouts, they naturally want to maximize their spread...
VIEW MOREHow ThreatX Lowers False Positives, Delivers Visibility, and Speeds Time to Value
We talk to a lot of security professionals about web application security, and three...
VIEW MOREYour Best First Step in Building an Application Security Program
Application security is critical, and it’s complicated. To be successful, it requires...
VIEW MOREHow to Overcome Credit Union Cybersecurity Challenges
Credit unions have a unique set of cybersecurity challenges stemming from their size, mission, and...
VIEW MORENew Research: Bot and DDoS Attacks on the Rise
Cybersecurity is changing fast. Just glance at the breach headlines, and you’ll most certainly...
VIEW MOREReady for a WAF Alternative? Your Peers Are Too
Holy crap it’s a pain to use. Maybe I just didn’t absorb enough of the...
VIEW MORE