What is Cross-Site Contamination & How to Prevent It

How to Choose a Website Security Provider

As more people are creating websites and becoming aware of website security, companies are popping up everywhere to help with the problem. And just like website security plugins, not all website security ...
Googlebot or a DDoS Attack?

Googlebot or a DDoS Attack?

A bot is a software application that uses automation to run scripts on the internet. Also called crawlers or spiders, these guys take on the simple yet repetitive tasks we do. There ...
Why It's Important to Update Your Website

How to Improve Your Website Resilience for DDoS Attacks – Part III – WAF

In the first post of this series, we talked about the practices that will optimize your site and increase its resilience to DDoS attacks. In the second post, we focused on caching ...
What is Cross-Site Contamination & How to Prevent It

How to Prevent Cross-Site Contamination for Beginners

What is Cross-Site Contamination? Cross-site contamination happens when a hacked site infects other sites on a shared server. Think of it as your kid in daycare catching the flu, next thing you ...

Sucuri Named December 2018 Gartner Customers’ Choice for Web Application Firewalls

The Sucuri team is excited to announce that we have been recognized as a December 2018 Gartner Peer Insights Customers’ Choice for the Sucuri Firewall. Our team takes great pride in this ...
Real-Time Fine-Tuning of the WAF via API

Real-Time Fine-Tuning of the WAF via API

Though the Sucuri Firewall is simple to set up and protects your website immediately, it’s possible to have granular control of the WAF by using an API. For instance, there’s a specific ...
Product Update: Sucuri Firewall in Singapore and Amsterdam

Product Update: Sucuri Firewall in Singapore and Amsterdam

Over three years ago, we transitioned the Sucuri Firewall (WAF) away from the cloud and expanded it to run on top of our own Anycast content delivery network (CDN). We provide security ...
PCI for SMB: Requirement 5 & 6 – Maintain a Vulnerability Management Program

PCI for SMB: Requirement 5 & 6 – Maintain a Vulnerability Management Program

This is the fourth post in a series of articles on understanding the Payment Card Industry Data Security Standard – PCI DSS. We want to show how PCI DSS can help anyone ...
How to Improve Your Website Security Posture – Part II

How to Improve Your Website Security Posture – Part II

In the first post of this series, we discussed some of the main website security threats. Knowing the website security environment is a vital part of a good website posture. However, it ...

How to Improve Website Resilience for DDoS Attacks – Part II – Caching

In the first post of this series, we talked about the practices that will optimize your site and increase your website’s resilience to DDoS attacks. Today, we are going to focus on ...
Loading...