Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

HTTP/2 Rapid Reset Attack Vulnerability

Google, Amazon Web Services & others recently disclosed a vulnerability in HTTP/2 protocol, which is being tracked as “CVE-2023-44487”. The flaw lies in how the HTTP/2 protocol was implemented to increase the efficiency of transmitting various messages between endpoints by “Stream multiplexing”.

Cloudflare vs. Azure WAF

Cloudflare WAF protects against web-based attacks and malicious traffic using customizable rule sets. Cloudflare’s network extends across numerous data centers worldwide, ensuring efficient content delivery and robust DDoS protection. Moreover, Cloudflare provides supplementary functionalities such as CDN caching, SSL/TLS encryption, and DNS management to enhance overall web performance and security.

What is an Authenticated Security Scan, And Why Is It Important?

Many organizations today rely only on “unauthenticated” web application security scans, leaving their admin and user portals unchecked. While it is crucial to protect your system against external automated attacks, you shouldn’t ignore the possibility of a targeted attack from someone with valid logins. If your app lets anyone signup online, it could easily expose your business to attackers.

Akamai Vs. Cloudflare WAF

Akamai, a pioneering WAF solution, retains its key position within the evolving WAAP landscape. As one of the earliest players in the CDN space, Akamai maintains its dominance in content delivery. Akamai’s App & API Protector combines a range of leading-edge technologies, including web application firewall, bot mitigation, API security, and DDoS protection, all within a user-friendly, unified solution.

Discover Hidden Assets with AppTrana WAAP

We are excited to introduce Asset Discovery – a new feature that allows you to find and protect unknown applications, domains, sub-domains, and other public assets. This feature is now part of AppTrana WAAP and Indusface WAS (Web Application Scanning). Unknown is the biggest risk, especially when it is an orphaned app that was launched by one of your business divisions that is no longer in use.

Akamai vs. Imperva WAF

As the pioneer in web security, Akamai takes the lead with its Web Application Firewall. It excels at detecting threats within HTTP and SSL traffic at the Edge Platform, offering a proactive shield for your origin data centers. Akamai’s extensive experience in content delivery networks (CDN) makes it an industry favorite, especially in media, gaming, and streaming domains.

Top Imperva WAF Alternatives in 2023

Imperva WAF is a comprehensive security tool for web applications and APIs, which monitors and filters both incoming and outgoing traffic while also blocking potential attacks. Imperva is utilized by medium to large enterprises to prevent potential security breaches. Through its hybrid web security testing approach, the WAF ensures a zero false-positive SLA for all clients.

The Importance of Vulnerability Assessment: Types and Methodology

Vulnerability assessment identifies weaknesses or vulnerabilities in computer systems, networks, and software, along with the inherent risks they introduce. By using specialized tools like vulnerability scanners and manual methods, vulnerability assessment helps organizations figure out where they might be at risk. This process not only identifies potential problems but also helps prioritize them based on their severity level.