You wouldn't insure only half your house. Why would you secure only half of your systems?

What Is Client-Side Security and Why Is It Important for Your Business?

| | Blog
You can’t open a newspaper today without reading about another cyberattack or data breach—with web applications accounting for a fair share of the reporting. Web application vulnerabilities, poor infrastructure configurations, and inadequate security controls make these web-based targets a prime focus for attackers. That’s why organizations need to make sure ... Read More

What is Shadow Code and Why Should I Worry?

| | Blog
Learn about shadow code and how this code hidden in internal or external repositories and libraries can be a danger to your web apps. The post What is Shadow Code and Why Should I Worry? appeared first on Feroot ... Read More

Highlights from the Ultimate Guide to Client-side Security

| | Blog
In today’s world, businesses, economies, and lives are connected by a complex spider web of code and software applications. This code and these applications drive e-commerce, financial transactions, and data input. They impact our ability to quickly transfer money from one account to another, to fill out an online mortgage ... Read More

How to Protect the Supply Chain from Vulnerable Third-party Code

| | Blog
Learn what you can do to protect your web applications and web pages from attacks exploiting vulnerable third-party code. The post How to Protect the Supply Chain from Vulnerable Third-party Code appeared first on Feroot ... Read More

CAPTCHAs—More dangerous than useful

| | Blog
CAPTCHA and reCAPTCHA are an ever-present component on any website that requires user interaction. But the risks of embedding CAPTCHA/reCAPTCHA plugins on a website can outweigh the benefits. Flawed code can increase the threat of client-side attacks. Who hasn’t encountered a CAPTCHA? You know what we’re talking about…those annoying website ... Read More
Client-side killchain.

Client-side Kill Chain – JavaScript Malware Attack Defense

| | Blog
I’ve been in the cybersecurity products and services industry for close to a decade and I have quite a few fond memories learning from talented security practitioners. In 2015, I found myself working with Andy Pendergast at ThreatConnect. At the time, I was new to the cyber threat intelligence (CTI) ... Read More

The Ultimate Guide to Client-side Security – Executive Overview

| | Blog
Discover how to protect the products and services you deliver through web applications and webpages. The post The Ultimate Guide to Client-side Security - Executive Overview appeared first on Feroot ... Read More

How to Check If your JavaScript Security is Working

| | Blog
Knowing whether your JavaScript is secure is crucial to maintaining a safe user experience for your customers. Learn how to check! The post How to Check If your JavaScript Security is Working appeared first on Feroot ... Read More

How to Recover from a Client-side Attack

| | Blog
Learn how to recover from a client-side attack such as web skimming, Magecart, cross-side scripting, and other JavaScript webapp breaches. The post How to Recover from a Client-side Attack appeared first on Feroot ... Read More

Hackers gonna hack: The importance of web security

| | Blog
There is no getting around it. Your website has vulnerabilities and, yes, it can be hacked. If someone hasn’t already breached your website, chances are pretty darn good that they will sometime in the near future. Websites that are particularly attractive to hackers are those that have a high level ... Read More