SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

What You Need to Know About the New IAST and RASP Guidelines in NIST 800-53

 

Continue Reading >>

Why You Need Both a WAF and RASP to Protect Your Web Applications

One thing that you learn in the technology space is that change is constant. Companies, solutions, and people who sit on their laurels can find themselves in a position of never-ending catch up. For security operations and application security..

Continue Reading >>

Why Blue Teams Need RASP: Continuous Application Threat Monitoring with Runtime Exploit Prevention

Runtime Application Self-Protection (RASP) adds threat visibility and security control to application runtimes so you can continuously discover application threats and block attacks—as they are still happening. Enjoy visionary RASP breach..

Continue Reading >>

Pulling Back the Curtain On: Zip File Overwrites

Zip file overwrites are a cool but rare vulnerability that can occur on apps that work with user-supplied zip files. The folks at Snyk recently found a slew of libraries that do that, and there is a lot of history in this attack vector. In fact,..

Continue Reading >>

Pulling Back the Curtain on RASP

If you set out to build a new WAF today (which, believe it or not, people are still doing), everyone would have some idea of how it would work -- you'd setup a reverse proxy, and then use signatures of all kinds on the parameters, headers, body,..

Continue Reading >>

Contrast Protect + WAF: A Day in the Life of a User

A Web Application Firewall can watch network data, but the architecture does not enable them to see how that data is actually used. As a result, they sound an equal alarm for all attack attempts without raising the importance for attacks that could..

Continue Reading >>

SUBSCRIBE TO THE BLOG