Please turn on your JavaScript for this page to function normally.
L7 Defense
Why the updated OWASP Top 10 list can’t be addressed by WAF?

Did you know that OWASP published its updated Top 10 web vulnerabilities list? And that it includes updates that could impact the design and functionality of your WAF …

2022
6 top cybersecurity trends from 2021 and their impact on 2022

2021 has been a wild year in the cybersecurity space. From supply chain attacks like the SolarWinds hack to the NSO Group’s spyware scandal to the Colonial Pipeline ransomware …

cybersecurity investments
Cybersecurity budgets surge, as skills gap wreaks havoc on 2022 plans

As enterprises plan and set budgets for the new year ahead, the vast majority are expecting to channel more dollars toward enhancing their cybersecurity efforts. Organizations …

hands
How familiar are consumers with data protection best practices?

With data breaches on the rise along with consumer demand for privacy and control over their own data, governments have in turn adopted new data protection regulations — and …

bulb
Rethinking cybersecurity becomes imperative as devices and apps move away from physical offices

69.1% of professionals with security responsibility believe a rethink is needed to deal with the threat of cybersecurity now that devices and applications have moved outside …

collaboration
Half of all helpdesk tickets relate to UC&C issues

93% of enterprise-level organizations have increased their use of unified communications and collaboration (UC&C) platforms since the onset of the COVID-19 pandemic, a …

Log4j
The Log4j saga: New vulnerabilities and attack vectors discovered

The Apache Log4j saga continues, as several new vulnerabilities have been discovered in the popular library since Log4Shell (CVE-2021-44228) was fixed by releasing Log4j …

AI
How can AI be made more secure and trustworthy?

While we’re still debating whether and how long it will take to reach singularity and superintelligence, artificial intelligence is playing an increasingly important role in …

zero
Zero trust isn’t just for IT, it can also protect targeted critical infrastructure

Gartner predicts that by 2025 cyber attackers will have weaponized OT environments to successfully harm or kill humans. Not only is a solution to secure OT assets imperative, …

phishing
How likely are employees to fall prey to a phishing attack?

22% of employees are likely to expose their organization to the risk of cyber attack via a successful phishing attempt, a Phished report reveals. Analysis of the broad and …

Magnify
Shifting security further left: DevSecOps becoming SecDevOps

Veracode has revealed usage data that demonstrates cybersecurity is becoming more automated and componentized in line with modern software architectures and development …

application security testing
GoTestWAF: Open-source project for evaluating web application security solutions

GoTestWAF is a tool for API and OWASP attack simulation that supports a wide range of API protocols including REST, GraphQL, gRPC, WebSockets, SOAP, XMLRPC, etc. It was …

Don't miss

Cybersecurity news