Docker Containers
Container Security

Docker Containers

Nowadays enterprises are looking to transform software development practices to be agile to deliver more software faster. Container technology is...
Read More
Containers and the OWASP Top 10
Container Security

Containers and the OWASP Top 10

The Open Web Application Security Project (OWASP) periodically publishes a list of the top 10 web application security risks.  The...
Read More
Anomaly Detection Systems and Generalization
Anomaly Detection

Anomaly Detection Systems and Generalization

Network servers are always vulnerable to attacks. Therefore security measures to protect vulnerable software are an essential part of securing...
Read More
Container Security
Container Security

Container Security

  To facilitate scalability and resilience, many organizations are running applications in cloud-native environments, with make use of containers and...
Read More
Virtual Patch Creation Phase
Virtual Patching Web Application Firewall

Virtual Patch Creation Phase

Read More
Preparation Phase, Identification Phase and Analyze Phase
Web Application Firewall

Preparation Phase, Identification Phase and Analyze Phase

Preparation Phase The significance of adequately utilizing the preparation phase in respect of virtual patching can't be overstated. Before dealing...
Read More
Virtual Patching in Vulnerability Management
Virtual Patching

Virtual Patching in Vulnerability Management

Virtual patching demands applying a layer of security policy that prevents and intercepts vulnerability exploitation. A productive solution requires the...
Read More
WAF + RASP + Bot Mitigation + DDoS in Kubernetes Platform
Web Application Firewall

WAF + RASP + Bot Mitigation + DDoS in Kubernetes Platform

There are many products out there that work as a WAF. WAF is not really aware of the application it...
Read More
PATCH MANAGEMENT
Web Application Firewall

PATCH MANAGEMENT

Patch Management is a strategic process of acquiring, testing, and installing updated software. But, most of the companies find themselves comply...
Read More
Why Is Virtual Patching So Important?
Web Application Firewall

Why Is Virtual Patching So Important?

Virtual Patching gives a rapid way of a solution to provide web security. Even though the preferred solution is temporary,...
Read More
Why do we need to apply Virtual Patching on the websites?
Virtual Patching

Why do we need to apply Virtual Patching on the websites?

Safeguarding the company's assets against existing and emerging vulnerabilities is the most critical task that security teams are struggling with....
Read More
Virtual Patching Tools
Virtual Patching

Virtual Patching Tools

Various tools are used to achieve Deep Security virtual patching. It includes: Web Application Firewall (WAF) Intrusion Prevention System (IPS)...
Read More
Common Roadblocks to Source Code Fixes
Web Application Firewall

Common Roadblocks to Source Code Fixes

From the technical point of view, the initial mitigation strategy would be for an organization to rectify the discovered vulnerability...
Read More
Advantages of Virtual Patching
Virtual Patching

Advantages of Virtual Patching

Today’s systems can be considered as very advanced as well as complex, with multiple dependencies and interrelationships. It requires a...
Read More
Virtual Patching: Definition
Virtual Patching

Virtual Patching: Definition

The term patch is misleading because the vulnerable system is not being patched. A quick repair job for a piece...
Read More
Introduction to Virtual Patching
Virtual Patching

Introduction to Virtual Patching

“Virtual Patching” is a term that was initially used by Intrusion Prevention System vendors many years ago. It is also...
Read More
How to create a Kubernetes Service
Container Security

How to create a Kubernetes Service

With the running application, we want to access one service. Let’s create a ClusterIP type of service. We can: Create...
Read More
Kube-Proxy and Headless Services
Container Security

Kube-Proxy and Headless Services

Kube-Proxy Kube-proxy implements a form of virtual IP for services for all types except ExternalName. Three modes are: (a) Proxy-mode:...
Read More
Kubernetes Service Types
Container Security Web Application Firewall

Kubernetes Service Types

Key Terms Nodes: Virtual host(s) on which containers/pods are running. Kubernetes Service: A logical set of pods that perform identical...
Read More
Introduction to Kubernetes Services
Web Application Firewall

Introduction to Kubernetes Services

Key Terms: Pods: One or more containers that shares the storage and network with a Kubernetes configuration, mentioning the behavior...
Read More
1 2 3 17