Runtime Application Security: Made to Protect Against LOG4J2 Attacks

Runtime Application Security: Made to Protect Against LOG4J2 Attacks

A recently discovered vulnerability in LOG4J2 (also referred to as LOG4SHELL) is being widely reported as one of the most dangerous vulnerabilities in application software to date. There is already news that it is being exploited in the wild, putting widely used applications and cloud services at risk. Runtime Application ... Read More
Understanding the 2019 Capital One Attack

Understanding the 2019 Capital One Attack

Learn about how the Capital One attack was carried out, why Web Application Firewalls failed to prevent the attack, and how the attack could have been prevented. The post Understanding the 2019 Capital One Attack appeared first on K2io ... Read More
The Limitations of SASE and Zero Trust

The Limitations of SASE and Zero Trust

While SASE and Zero Trust work well for applications where it’s easy to identify valid users, these frameworks fail to address two specific areas of concern. The post The Limitations of SASE and Zero Trust appeared first on K2io ... Read More
Learning More About Vulnerability Scanning

Learning More About Vulnerability Scanning

A recent article published on the G2 Learning Hub was titled "The Top 5 Vulnerability Scanners You Need to Patrol Security Grids," and while it covered the list of what the author considered to be the top 5, what really caught my attention about the article was the introduction to ... Read More