Preparing for Artificial Intelligence (AI) DDOS Attacks, Part 2

This is part-2 of a 2 part series that discusses the evolution from human to machine based DDoS attacks. It specifically delves into how to prepare for such attacks while keeping low positives and negatives to industry standard low. The Evolution of DDoS In the early 2000’s, we had simple ... Read More

Artificial Intelligence (AI) used in DDOS Attacks

This is part-1 of a 2 part series that discusses the use of Artificial Intelligence (AI) to compromise web applications. This part introduces the concept of AI and its use for destruction by cybercriminals. The speed at which cybersecurity has evolved over the last decade has taken everyone by surprise ... Read More

Sail Smooth with Cloud Threats, Part 2 – Cloud APIs

This is part-2 of a 2 part series that continues to discuss cloud threats and how they affect web applications in the cloud. The following addresses insecure API’s and Management Plane, deepening the threat landscape. Management Plane – Security Perspective The cloud API management plane is one of the most ... Read More

GDPR: Data Controllers Be Prepared

As we delve deeper into the digital world of communication, from the perspective of privacy, the impact of personal data changes in proportion to the way we examine security. As organizations chime in this world, the normal methods that were employed to protect data have now become obsolete. This forces ... Read More

Sail Smooth with Cloud Threats – Cloud Security Issues

This is part-1 of a 2 part series that introduces the cloud and the types of threats and cloud security issues that opens the web application to compromisation. The following post addresses hypervisor breakouts, also known as VM escape. Cloud Introduction Cloud computing is the technology that equips the organizations ... Read More
The Evolving Security Paradigm, Part 2

The Evolving Security Paradigm, Part 2

This post is part 2 of a two-part series that addresses the rapid changes in security paradigms. The change to security not only affects operation, it increases the level of complexity in security designs. The following post discusses the history of security paradigms and the challenges that arise from their ... Read More
The Evolving Security Paradigm, Part 1 – History of Firewalls

The Evolving Security Paradigm, Part 1 – History of Firewalls

This post is part 1 of a two-part series that addresses the rapid changes in security paradigms. Driven by the need to satisfy new requirements and keep pace with the digital world greatly impacts the level of security. The following post introduces the history of firewalling and security paradigms. Introduction ... Read More
Changes to Network Architectures & The Security Tools required, Part 2

Changes to Network Architectures & The Security Tools required, Part 2

Part one in this two part series looked at the evolution of a network architecture and how it affects security. Here we will take a deeper look at the security tools needed to deal with these changes. The Firewall is not enough Firewalls in three-tier or leaf and spine designs ... Read More
Evolution of the Network Architecture & How It has Affected Security, Part 1

Evolution of the Network Architecture & How It has Affected Security, Part 1

The History of Network Architecture The goal of any network and its underlying infrastructure is simple. It is to securely transport the end user’s traffic to support an application of some kind without any packet drops which may trigger application performance problems. Here a key point to consider is that ... Read More
Online Security: Application Security Testing – Part 2

Online Security: Application Security Testing – Part 2

| | articles, Web Security Zone
Part 1 in this series looked at Online Security and the flawed protocols it lays upon. Online Security is complex and its underlying fabric was built without security in mind. Here we shall be exploring aspects of Application Security Testing. We live in a world of complicated application architecture compound ... Read More
Loading...