Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Managed WAF Done Right: Turning Security into CFO-Grade ROI

When CISOs and security teams evaluate a Web Application and API Protection (WAAP) platform, the conversation often starts and ends with technical capabilities. That focus is natural, but it does not reflect the full decision-making process in most enterprises. Security leaders may drive the evaluation, yet true adoption requires building consensus with finance and procurement teams who view the investment through a different lens.

Introducing Cato's API Assistant: Your New Copilot for GraphQL

Imagine you just got a new car with a feature that automatically adjusts the air conditioning based on live weather forecasts. To activate it, you need to connect the car to an external weather service. You could take it to the garage, pay someone to configure it, and wait for the job to be done. Or, you could use a built-in assistant that asks you two simple questions and shows you how to set everything up in minutes. That’s the idea behind Cato’s new API Assistant.

Defending Against WAF, API, and DDoS Attacks

Defending Against WAF, API, and DDoS Attacks In this video from SourceForge, Carlo Alpuerto of A10 Networks explains the "outside-in" protection philosophy behind ThreatX. He uses the metaphor of a castle wall, stating that the defense focuses on who and what is attacking it, rather than what is behind it. Alpuerto details the flexibility of the A10's ThreatX solution, which can be deployed in various hybrid scenarios, including on-premise physical or virtual environments, as well as different cloud environments like AWS, Azure, and GCP.

Better Network Visibility with New 11:11 Cloud Console Tools

When it comes to driving directions, it is easy to become dependent on a navigation system, especially when you are in an unfamiliar area. Unfortunately, when you run into one of those pesky locations that still don’t have wireless coverage you can quickly find yourself without much of an idea of where to turn next. Managing network infrastructure shouldn’t feel like navigating in the dark.

How To Threat Hunt in Encrypted Network Traffic

Threat hunters need evidence to find adversaries. Networks offer a broad and reliable source of evidence, helping hunters make sense of movement across their environment via an immutable record of activity. Traffic, unlike endpoints, cannot lie. But the rise of encryption complicates this picture, especially where decryption isn't an optimal or possible solution.

Let's Talk Security: The Quantum Threat & Migration to Post-Quantum Cryptography (PQC)

Forescout CEO Barry Mainz is joined by Forescout's Robert McNutt, Chief Strategy Officer, and Daniel dos Santos, Sr. Director of Research at Vedere Labs, to discuss the adoption of post-quantum cryptography (PQC) and how to overcome hurdles.

Windows AppLocker - Tanium Enforce - Tanium Tech Talks #137

See how Tanium makes it easier to manage at scale across multiple environments. Tanium helps you reach and manage all of your traditional servers and workstations, and also those that are hard-to-reach: Older Windows versions VPN clients and work-from-home Stand-alone non-AD-domain-joined (like industrial environments) AD-domain-joined spanning multiple domains and forests.

Defending Against WAF, API, and DDoS Attacks

Defending Against WAF, API, and DDoS Attacks In this SourceForge video, Carlo Alpuerto of A10 Networks shares insights on how ThreatX protects WAF, API, DDoS, and bot attacks, processing all the information within a single database. Alpuerto highlights the platform's ability to apply these protections and actionability, showcasing how users can create and manage specific rules. He also notes that the ThreatX security operations center (SOC) team curates these rules daily, utilizing threat intelligence, CVE notifications, and zero-day news to provide comprehensive, up-to-date protection.