Articles : Iwan Price-Evans


Snapt Announces The One Security Package To Run Kubernetes In Public Cloud

by Iwan Price-Evans on News • May 16, 2022

Snapt sponsors KubeCon Europe and brings AI-powered threat intelligence, WAAP, and bot protection for Kubernetes ingress in public cloud – all in one click. Valencia, Spain — Snapt, the leading provider of future-proof, cloud-neutral, and platform-agnostic load balancing and security solutions, demonstrates a powerful, AI-powered platform for securing Kubernetes ingress in public cloud environments at KubeCon Europe in Valencia. Snapt Nova is a centrally managed load balancing and application security platform designed for cloud-native and hybrid environments and includes real-time threat intelligence, web application and API protection, and bot protection. Snapt demonstrates Snapt Nova at KubeCon Europe, 16-20 May, at booth S32 on the show floor or our virtual booth here: (link for registered attendees only).

Read More →

Best Practices for Building Scalable Applications

by Iwan Price-Evans on Scalability • May 10, 2022

The Internet and web applications have enabled businesses to scale like never before. Previously, a business’s physical footprint restricted it to a particular market, and simple logistics limited the number of transactions per day. A similar company can now create web applications that serve a global audience and process thousands of concurrent transactions. But is this scale available to every business?

Read More →

Efficient GRC with cybersecurity tooling

by Iwan Price-Evans on Security • May 5, 2022

“Governance, risk, and compliance” (GRC) might be dirty words for many people working in application development and delivery. Strict rules and processes can be obstacles to innovation or meeting project deadlines. However, with security failures causing downtime, lost revenue, leaked customer and proprietary information, and hefty regulatory fines, application teams cannot afford to ignore GRC measures designed to limit the probability and potential for harm.

Read More →

Designing Secure Applications

by Iwan Price-Evans on Tips and Tricks • April 7, 2022

Hackers, malware, cybercriminals, and more threaten modern applications constantly. Malicious actors will try to uncover and exploit any vulnerabilities to steal private data, disrupt your service, and more. When designing our applications, we must prevent or mitigate these potential vulnerabilities as early as possible. Identifying and fixing security gaps late in the development process can be very expensive. Many of the biggest vulnerabilities arise from poor design and require significant effort to resolve. You can avoid wasting time and resources by following the correct principles in the application design phase.

Read More →

Getting Your DevOps Team Ready For Multi-Cloud

by Iwan Price-Evans on DevOps • March 22, 2022

There are many reasons why an organization would want to adopt a multi-cloud strategy. With the potential for cost savings, better scalability, improved redundancy, and access to a wider set of features, it's no surprise that so many companies are exploring using multiple cloud vendors as an option. However, going multi-cloud is more than just getting your applications run across different cloud service providers  – one of the biggest challenges teams face is supporting multi-cloud applications in production. 

Read More →

3 Key Steps To Identify And Block Application Attacks

by Iwan Price-Evans on Security • March 10, 2022

It feels good to successfully launch your application on the internet, but what do you do when certain people want to cause trouble? Malicious users can create distributed denial of service (DDoS) attacks, search for vulnerabilities to steal your data, install ransomware to extort money from you, or do other bad things. How can you detect all these cybersecurity threats and prevent them from abusing your application?

Read More →

Global Real-Time, Real-World Threat Intelligence for your WAF

by Iwan Price-Evans on Security • March 3, 2022

The foundation of a good security program is the use of comprehensive surveillance information. It is hard to protect physical and digital assets if you do not know the ways the bad actors are trying to get through your defenses. Ideally, you would observe criminals and see where they are and which methods they are using. In the real world, this is often not the case and we must make educated guesses. But what if we had access to real-world information so we did not have to guess?  

Read More →

Subscribe via Email

Get daily blog updates straight to your email inbox.

We care about the protection of your data. Read our Privacy Policy.

You have successfully been subscribed!