Articles : Security

5 MINUTES

How To Choose A Web Application Firewall

by Craig Risi on Security • June 8, 2022

Every business exposing online applications, services, and APIs needs a Web Application Firewall (WAF) to operate safely and protect against cybersecurity threats. A WAF identifies and blocks attacks that lead to downtime, leaked data, and compromised transactions and accounts. However, you might find that choosing the right WAF is a tricky business. 

Read More →
5 MINUTES

How To Secure Kubernetes Containers

by Dave Blakey on DevOps • May 31, 2022

If you are thinking of deploying applications in containers and using a container orchestration platform like Kubernetes, you must consider security. Smaller and simpler apps will reduce your development, testing, and maintenance costs – but security can be more challenging when compared with deploying in VMs. 

Read More →
8 MINUTES

Best Back-End Frameworks For Security

by Mark Trent on Security • May 19, 2022

In previous articles, we reviewed some popular high-performance front-end and back-end frameworks. These articles focus on how these frameworks have been developed for high-performance. Here we will look at back-end frameworks that offer developers and product managers highly secure features for application development.

Read More →
4 MINUTES

Snapt Announces The One Security Package To Run Kubernetes In Public Cloud

by Iwan Price-Evans on News • May 16, 2022

Snapt sponsors KubeCon Europe and brings AI-powered threat intelligence, WAAP, and bot protection for Kubernetes ingress in public cloud – all in one click. Valencia, Spain — Snapt, the leading provider of future-proof, cloud-neutral, and platform-agnostic load balancing and security solutions, demonstrates a powerful, AI-powered platform for securing Kubernetes ingress in public cloud environments at KubeCon Europe in Valencia. Snapt Nova is a centrally managed load balancing and application security platform designed for cloud-native and hybrid environments and includes real-time threat intelligence, web application and API protection, and bot protection. Snapt demonstrates Snapt Nova at KubeCon Europe, 16-20 May, at booth S32 on the show floor or our virtual booth here: https://bit.ly/38VKVwo (link for registered attendees only).

Read More →
7 MINUTES

Efficient GRC with cybersecurity tooling

by Iwan Price-Evans on Security • May 5, 2022

“Governance, risk, and compliance” (GRC) might be dirty words for many people working in application development and delivery. Strict rules and processes can be obstacles to innovation or meeting project deadlines. However, with security failures causing downtime, lost revenue, leaked customer and proprietary information, and hefty regulatory fines, application teams cannot afford to ignore GRC measures designed to limit the probability and potential for harm.

Read More →
3 MINUTES

Secure Coding Practices

by Craig Risi on Tips and Tricks • April 26, 2022

We previously addressed the need to design secure applications and test for security during development. However, despite all good intentions, it is all too easy to focus on solving the immediate functional problem and ignore other objectives like security when writing code. 

Read More →
4 MINUTES

How To Test Application Security

by Craig Risi on Security • April 20, 2022

We constantly read about leaks and security attacks that hit well-known applications. Businesses cannot take security for granted. With so much critical data in play, they must prioritize application security and the process of identifying security flaws to ensure apps are safe. 

Read More →
5 MINUTES

Designing Secure Applications

by Iwan Price-Evans on Tips and Tricks • April 7, 2022

Hackers, malware, cybercriminals, and more threaten modern applications constantly. Malicious actors will try to uncover and exploit any vulnerabilities to steal private data, disrupt your service, and more. When designing our applications, we must prevent or mitigate these potential vulnerabilities as early as possible. Identifying and fixing security gaps late in the development process can be very expensive. Many of the biggest vulnerabilities arise from poor design and require significant effort to resolve. You can avoid wasting time and resources by following the correct principles in the application design phase.

Read More →
3 MINUTES

3 Key Steps To Identify And Block Application Attacks

by Iwan Price-Evans on Security • March 10, 2022

It feels good to successfully launch your application on the internet, but what do you do when certain people want to cause trouble? Malicious users can create distributed denial of service (DDoS) attacks, search for vulnerabilities to steal your data, install ransomware to extort money from you, or do other bad things. How can you detect all these cybersecurity threats and prevent them from abusing your application?

Read More →

Subscribe via Email

Get daily blog updates straight to your email inbox.

We care about the protection of your data. Read our Privacy Policy.

You have successfully been subscribed!