Email Alerts
-
How to choose between source code reviews or Web application firewalls
Michael Cobb explains how to make the right choice between Web application firewalls or source code security reviews. Tip
-
Web application firewall deployments gain traction
In this podcast, Ivan Ristic, creator of the ModSecurity, discusses his new ModProfiler and the challenges of deploying Web application firewalls. Compliance is driving adoption. News
-
Positive changes coming to ModSecurity
Black Hat: The popular open source Web application firewall is getting a new tool that observes and analyzes application traffic and helps establish accepted behavior. Article
-
Best practices for application-level firewall selection and deployment
Application-level firewalls are an essential aspect of any organization's multi-layered defense strategy, but the implementation process has some security pros scratching their heads. In this tip, contributor Joel Dubin discusses the contrasting fact... Tip
-
PCI Council issues clarification on Web application security
The PCI Security Standards Council released documentation hoping to reduce a tide of confusion over enforcement of application firewalls and code reviews. Article
-
Will firewalls have to adapt to applications that use port 80?
The Web browser is now the most commonly used application user interface, and port 80 is used for the majority of these browser-application communications. App expert Michael Cobb explains how firewall makers have had to adapt their technology accord... Ask the Expert
-
NAC, disk encryption gaining attention, survey shows
IT decision makers said they are struggling to fund projects, but many expressed interest in NAC, disk encryption and application security technologies. Article
-
What evaluation criteria should be used when buying a firewall?
Choosing a firewall for the enterprise isn't always easy. In this expert Q&A, Mike Chapple provides three important points to consider before deciding on a product. Ask the Expert
-
What are the drawbacks to application firewalls?
Application-layer firewalls examine ingoing and outgoing traffic more carefully than traditional packet-filtering firewalls, so why are some holding back on deployment? In this SearchSecurity.com Q&A, Michael Cobb reveals some cost and performance is... Ask the Expert
-
Building application firewall rule bases
Security professionals have worked hard in recent years to tighten up their security controls, but they often neglected one area: the application layer. In this tip, Mike Chapple explains how a carefully deployed application firewall can plug a criti... Tip
Security Management Strategies for the CIO