Guardians of the Enterprise — Insights from leading cyber experts.

Listen Now →

Web Application Firewall

46 articles

← All Articles
How Does a WAF Work?

How Does a WAF Work?

A Web Application Firewall (WAF) enhances cybersecurity by filtering and blocking malicious traffic, protecting web applications from attacks…

What is a Reverse Proxy, How Does it Work, and What are its Benefits?

What is a Reverse Proxy, How Does it Work, and What are its Benefits?

A reverse proxy is an essential component of web application infrastructure, providing a layer of abstraction between clients…

How do Compliance Regulations Drive Application Security?

How do Compliance Regulations Drive Application Security?

Explore how compliance standards like PCI DSS, SOC 2, and GDPR enhance application security by enforcing specific requirements…

Managed WAF: A Must-Have to Stop Website Attacks

Managed WAF: A Must-Have to Stop Website Attacks

A Managed WAF is a comprehensive cybersecurity service offered by specialized providers to oversee, optimize, and maintain the…

Website Security – 10 Effective Website Protection Strategies

Website Security – 10 Effective Website Protection Strategies

Discover vital website protection strategies like encryption, regular backups, access control, WAF firewall implementation, proactive malware scanning, &…

Six Key Considerations When Deploying a Web Application Firewall 

Six Key Considerations When Deploying a Web Application Firewall 

Looking for a web application firewall? Consider these six key consideration to make an informed choice for your…

Web Application Firewall: More Essential Than Ever

Web Application Firewall: More Essential Than Ever

Web application firewalls (WAFs) are considered more effective than traditional firewall solutions in securing websites and web applications.…

Polkit Local Privilege Escalation Vulnerability (CVE-2021-4034)

Polkit Local Privilege Escalation Vulnerability (CVE-2021-4034)

What is Polkit Local Privilege Escalation Vulnerability (CVE-2021-4034)? A privilege escalation vulnerability has been disclosed in Polkit, formerly…

Hidden Web Application Threats Businesses Don’t Realize They Have

Hidden Web Application Threats Businesses Don’t Realize They Have

There has been a significant change in the IT landscape in the wake of businesses rapidly moving to a…

The Risks Of False Positives With Web Application Firewalls

The Risks Of False Positives With Web Application Firewalls

In order to stay abreast with the pace of web application development in the current age, automated tools…

What’s New in AppTrana? – A look into The Most Noteworthy WAF Updates In 2020

What’s New in AppTrana? – A look into The Most Noteworthy WAF Updates In 2020

The year 2020 came with a whole new level of security incidents due to the sudden push to…

Major Challenges in IoT Application Security

Major Challenges in IoT Application Security

How IoT has seeped in the lives of common people, making them feel future-ready, yet often throwing them…