Sicurezza

Protecting an Airline from Bad Bots: A Case Study

Pubblicato il

This APAC airline provides low cost domestic and international flights with hubs throughout the Pacific. Based on number of passengers flown domestically and internationally, it has become one of the largest regional airlines in APAC. Challenges Due to its recent success, the airline’s web platform and mobile APIs have become the target of cyberattacks from […]

Sicurezza

Here’s How Healthcare Providers Can Stay Secure & Compliant

Pubblicato il

This nonprofit health system is a recognized leader healthcare research and patientcare, offering pediatric, cancer and heart care, among a multitude of other services andprograms. With more than 70,000 employees, it services patients across 42 hospitalsand 1,500 care locations. Challenges and Solutions Patients and healthcare staff require access to data 24×7 via remote locations, without […]

Sicurezza

How WAFs Can Mitigate The OWASP Top 10

Pubblicato il

Cars require seatbelts. Pill bottles need safety caps. Applications need web application firewalls (WAFs), bot management and API protection, and for good reason. The web application threat landscape is in a constant state of flux. From DevOps to new attackvectors, these changes can leave security professionals scrambling to safeguard theirmost prized digital assets to secure […]

Sicurezza

7 Capabilities Every Web Application Firewall Should Provide

Pubblicato il

SQL injections, cross-site scripting, illegal resource access, remote file inclusion…the tools available to attack applications are as diverse as the infrastructure and services that web application firewalls (WAF) are required to protect. Businesses require a WAF that can provide complete coverage while adapting to your changing application environment. Here are 7 characteristics to look for […]

Sicurezza

The 2020 App Threats Landscape in Review

Pubblicato il

As more organizations place a priority on application development, production and hosting, new vulnerabilities and threats emerge. The need for a faster time to market, improved user experience and better resource utilization can influence what security protocols are implemented before an application is deployed, if at all. In 2020, 98% of Radware survey respondents saw […]

Sicurezza

Protecting APIs & Securing Applications So Business Can Thrive

Pubblicato il

Happy New Year! How about we start it with a quick pulse check? Does your organization have the desired visibility into application security events? Can you enforce consistent application protection across multiple platforms? How many APIs are you using and which data do they handle? Is application security well integrated into your continuous deployment pipeline? […]

Sicurezza

Enhancing Customer Application Security: A Case Study

Pubblicato il

BG Unified Solutions Pty. Ltd. is an Australian hosting services and solutions providerthat helps clients plan, build, and manage their IT. Founded in 2014, they provideinternational IT services, including infrastructure architecture, network optimization anddisaster recovery, to leading companies around the world. As part of these services, BG Unified also provides managed security services to helporganizations […]

Sicurezza

Protecting Applications Across Multiple Clouds

Pubblicato il

With cloud-based applications come new security risks that require expertise that is typically scarce and that can delay application deployment and maintenance. While WAFs play a critical role in protecting applications, deploying and managing a WAF can be complex and require ongoing refinement of security policies. Managing these policies often requires expertise and intimate familiarity […]

Sicurezza

Safeguarding Sensitive Law Enforcement Data: A Case Study

Pubblicato il

A national law enforcement agency in the APAC region needed to construct a new data center that potentially required a very complex network infrastructure design based on the agency’s security needs. The network design was complex because the organization’s security policy required separate sub-segments for each of its five departments, so a cyberattack on one […]

Sicurezza

10 Commandments for Securing Microservices

Pubblicato il

Facebook Twitter Linkedin SQL injections, cross-site scripting, access violations, remote file inclusion — running applications in a service mesh architecture doesn’t eliminate the risk from data leakage or service disruptions. Emerging continuous integration and continuous delivery (CI/CD) technologies disrupt common practices and processes and create new blind spots. Businesses require a next-generation web application firewall […]