Snapt Blog

4 MINUTES

Eliminate The Human Factor In Application Security

by Dave Blakey on Security • September 16, 2021
When it comes to online security, businesses make a lot of effort to ensure they have the right tools, firewalls, and settings in place to protect their applications from the dangerous threat of hackers, viruses, and DDoS attacks. However, the biggest security risk that is often not explored enough is the human factor.
Read More →
6 MINUTES

Best Practices for Edge Security

by Craig Risi on Security • September 7, 2021
In the corporate tech fight against security threats, there is perhaps no struggle more difficult than dealing with Edge Security. While companies can put in extensive security protocols and systems to protect much of their data, applications, and core data centers or cloud servers, monitoring the security of an entire organization and the people working for it is incredibly difficult.  
Read More →
7 MINUTES

Best Practices for Application Data Protection and Fraud Prevention

by Mark Trent on Tips and Tricks • August 17, 2021
It should perhaps go without saying that software security is the number one threat facing many companies in this technological age. With data now the most important asset that companies own and need to protect, security is one area that you can ill afford to compromise on. For this reason, you must develop strategies for securing data specifically, over and above protecting the rest of your IT systems and code.
Read More →
3 MINUTES

Delivering the digital banking disruption

by Iwan Price-Evans on Security • August 10, 2021
Digital transformation is rapidly changing industries across the globe. Banking faces perhaps the biggest transformation of all. 
Read More →
4 MINUTES

Securing Gatsby with Snapt Aria or Nova ADC

by Craig Risi on Security • July 27, 2021
One of the beauties of the software development world is that it’s never static. Tools and technologies are always evolving, so developers are always learning and advancing their knowledge and techniques.  While this makes things incredibly exciting for developers, it also presents many risks, especially in understanding how each new tool, framework, and development language deals with security and ensuring that you as a development team are in a position to deal with this.
Read More →
4 MINUTES

Nine Steps to Building Secure Software

by Craig Risi on Security • April 13, 2021
Cybersecurity may be improving all the time, but it is increasingly outmatched by the ingenuity and creativity of hackers, who keep finding new ways to discover and expose vulnerabilities across very complex ecosystems. We’ve seen some big hacks over the past few years across many industries, and now there is yet another big one that has impacted Microsoft and its Exchange Server, which manages emails and web access for thousands of companies.
Read More →
1 MINUTES

Introduction to the Nova Web Application Firewall

by Bethany Hill on Security • October 30, 2020
You can enable Nova's Web Application Firewall (WAF) on any HTTP/S Nova ADC with a single click of a button, and it is easy to use and manage. Learn how it works in this demo.
Read More →
4 MINUTES

How secure are your web servers?

by Grant Duke on Performance • February 27, 2020
Picture this: you have just completed a brand new installation of a server (Windows Server, Ubuntu, etc.) where you are going to deploy your organization's web portal. You need to ensure this service stays online and protected from bad actors.
Read More →
3 MINUTES

5 Website Security Threats and How to Stop Them

by Iwan Price-Evans on Tips and Tricks • December 5, 2019
It’s no secret that your website and business-critical applications are vulnerable to cyberattacks. When successful, the worst attacks can result in stolen customer data, illegal access to your servers and corporate data, malware and viruses that infect your customers’ devices, or a total server failure that prevents customers from accessing your website. Protecting your customers and your IT systems from malicious attacks is imperative for your business. But there are so many different attack vectors that it’s difficult to know where to start with online security.
Read More →