The corporate world is constantly getting smarter by leveraging the latest internet technology advancements. Information sharing has over the years witnessed a gradual displacement of paper with digital becoming the dominant and favored medium.
That application you’re currently using? More than likely, it was not developed with security in mind. No matter how much we discuss the topic and we talk about security driven application development, how many people and companies really even know how to do that?
Previously, we touched on the critical value of protecting one’s web server, and the various way to do just that such as the setting up of a DMZ or the creation of an IPS. We also introduced the fact that while a good idea, establishing an IPS in line with firewall as a means to intercept malicious traffic, was limiting.
Why do hackers want to control a web server? Because a server is often hundreds of times more powerful than a workstation, and that allows them to have a platform to launch attacks from a single point, rather than having to deal with multiple workstations.
Processor – Vol. 24, Issue 10 It’s easy to understand why so many companies worldwide, including 150-plus U.S. financial institutions, trust Network Box’s award-winning UTM security solutions. The company constantly and proactively works to combat security threats via its patented real-time PUSH update technology, global network of Security Operations Centers, and other measures. The company’s NBRS Ver5.0 platform transforms how UTM devices operate and how admins interact with them by introducing UTM-based “Holistic Security Management.” (Read more)
In the recent years, Internet threats have shifted from email to web based threats. Learn more about this shift and the firewall used to combat it.
written by: Pierluigi Stella CU Insight Web Application Firewall, or, simply put, WAF. True, the name does not explain very well what it is and what it’s supposed to do, although you’d probably guess it has something to do with protecting a web application. And you’d be right. In the recent years, Internet threats have shifted. Slowly in the beginning but increasingly rapidly in the last two years, from email to web based threats. In the past, hackers would use emails to distribute new threats, embedded into an email. Personally, I have not seen this for at least two years now, and the likely reason is because we all have anti viruses in place to protect us from email embedded threats. There is actually also another reason – distributing threats this way is very inefficient. It might have been useful ten years ago, but today, at the rate new threats are being created (40,000 new variations per day in some cases), this is no longer sufficient. It is far more efficient to compromise one website …