What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security

What is DORA? | Compliance Requirements for EU DORA Regulations | Contrast Security

Cyberattacks, supply-chain issues, flooding, tsunamis, wildfires, equipment failures and even war: The financial sector has no choice but to keep operations running through all these — among other — types of disruptions, ...
Runtime Security fits fast-paced AppDev environments | Contrast Security

Runtime Security fits fast-paced AppDev environments | Contrast Security

Are traditional AppSec tools keeping up with advances in software? That was the question The Application Security Podcast host Chris Romeo recently asked Contrast Security Co-founder and Chief Technology Officer Jeff Williams.  ...

Elevate Your Cybersecurity with Imperva Cloud WAF: More Than Just a Checkbox

In the world of digital modernization, having a web application firewall (WAF) isn’t an option – it’s a necessity. But in the endless sea of security solutions, how do you choose the ...
Introduction to NSFOCUS WAF Apply Rule Database

Introduction to NSFOCUS WAF Apply Rule Database

| | waf, Web security
In the versions before 6.0.7.3.61634, after users upgrade the NSFOCUS WAF Rule Database, they have to add the new rules one by one to the website’s policy based on the rule name ...
Path Traversal Attack Protection

Path Traversal Attack Protection

| | waf
A path traversal attack, or directory traversal, aims to access files and directories stored outside the web root folder. When the server does not check the user input strictly, by manipulating variables ...
AppTrana WAAP

17 Best Web Application Firewalls (WAF) & API Protection Software in 2023

Examine the best 17 Cloud WAF and WAAP Solutions for 2023, including a detailed analysis of their key features, pros, cons, reviews, and ratings. The post 17 Best Web Application Firewalls (WAF) ...
Real-world Insights — Why Customers are Moving from On-Premises WAFs to Cloud-Based WAFs

Real-world Insights — Why Customers are Moving from On-Premises WAFs to Cloud-Based WAFs

In today's world, web applications are a critical component of business operations. However, they are also a prime target for cyber-attacks. To protect against these threats, many organizations have implemented web application ...
AppTrana Custom Rule on Remote code execution (RCE)

How Does a WAF Work?

WAF or web application firewall, is the first line of defense between the app and the internet traffic. Understand how does a WAF works. The post How Does a WAF Work? appeared ...
Six Key Considerations When Choosing a Web Application Firewall 

Six Key Considerations When Choosing a Web Application Firewall 

Looking for a web application firewall? Consider these six key consideration to make an informed choice for your web security needs. The post Six Key Considerations When Choosing a Web Application Firewall  ...
Cloud WAF

The On-Prem WAF is Dead. Long Live the Cloud WAF

It’s time to take a look into the application environment changes and examine whether a WAF is the best solution for protection applications.  The post The On-Prem WAF is Dead. Long Live ...