5 MINUTES
How To Choose A Web Application Firewall
by
Craig Risi
on
Security
• June 8, 2022
Every business exposing online applications, services, and APIs needs a Web Application Firewall (WAF) to operate safely and protect against cybersecurity threats. A WAF identifies and blocks attacks that lead to downtime, leaked data, and compromised transactions and accounts. However, you might find that choosing the right WAF is a tricky business.
Read More →
5 MINUTES
How To Secure Kubernetes Containers
by
Dave Blakey
on
DevOps
• May 31, 2022
If you are thinking of deploying applications in containers and using a container orchestration platform like Kubernetes, you must consider security. Smaller and simpler apps will reduce your development, testing, and maintenance costs – but security can be more challenging when compared with deploying in VMs.
Read More →
8 MINUTES
Best Back-End Frameworks For Security
by
Mark Trent
on
Security
• May 19, 2022
In previous articles, we reviewed some popular high-performance front-end and back-end frameworks. These articles focus on how these frameworks have been developed for high-performance. Here we will look at back-end frameworks that offer developers and product managers highly secure features for application development.
Read More →
4 MINUTES
Snapt Announces The One Security Package To Run Kubernetes In Public Cloud
by
Iwan Price-Evans
on
News
• May 16, 2022
Snapt sponsors KubeCon Europe and brings AI-powered threat intelligence, WAAP, and bot protection for Kubernetes ingress in public cloud – all in one click. Valencia, Spain — Snapt, the leading provider of future-proof, cloud-neutral, and platform-agnostic load balancing and security solutions, demonstrates a powerful, AI-powered platform for securing Kubernetes ingress in public cloud environments at KubeCon Europe in Valencia. Snapt Nova is a centrally managed load balancing and application security platform designed for cloud-native and hybrid environments and includes real-time threat intelligence, web application and API protection, and bot protection. Snapt demonstrates Snapt Nova at KubeCon Europe, 16-20 May, at booth S32 on the show floor or our virtual booth here: https://bit.ly/38VKVwo (link for registered attendees only).
Read More →
7 MINUTES
Efficient GRC with cybersecurity tooling
by
Iwan Price-Evans
on
Security
• May 5, 2022
“Governance, risk, and compliance” (GRC) might be dirty words for many people working in application development and delivery. Strict rules and processes can be obstacles to innovation or meeting project deadlines. However, with security failures causing downtime, lost revenue, leaked customer and proprietary information, and hefty regulatory fines, application teams cannot afford to ignore GRC measures designed to limit the probability and potential for harm.
Read More →
3 MINUTES
Secure Coding Practices
by
Craig Risi
on
Tips and Tricks
• April 26, 2022
We previously addressed the need to design secure applications and test for security during development. However, despite all good intentions, it is all too easy to focus on solving the immediate functional problem and ignore other objectives like security when writing code.
Read More →
4 MINUTES
How To Test Application Security
by
Craig Risi
on
Security
• April 20, 2022
We constantly read about leaks and security attacks that hit well-known applications. Businesses cannot take security for granted. With so much critical data in play, they must prioritize application security and the process of identifying security flaws to ensure apps are safe.
Read More →
5 MINUTES
Designing Secure Applications
by
Iwan Price-Evans
on
Tips and Tricks
• April 7, 2022
Hackers, malware, cybercriminals, and more threaten modern applications constantly. Malicious actors will try to uncover and exploit any vulnerabilities to steal private data, disrupt your service, and more. When designing our applications, we must prevent or mitigate these potential vulnerabilities as early as possible. Identifying and fixing security gaps late in the development process can be very expensive. Many of the biggest vulnerabilities arise from poor design and require significant effort to resolve. You can avoid wasting time and resources by following the correct principles in the application design phase.
Read More →
3 MINUTES
3 Key Steps To Identify And Block Application Attacks
by
Iwan Price-Evans
on
Security
• March 10, 2022
It feels good to successfully launch your application on the internet, but what do you do when certain people want to cause trouble? Malicious users can create distributed denial of service (DDoS) attacks, search for vulnerabilities to steal your data, install ransomware to extort money from you, or do other bad things. How can you detect all these cybersecurity threats and prevent them from abusing your application?
Read More →