top of page

Blogs


Announcing open-appsec WAF Integration with Docker SWAG (Secure Web Application Gateway)
Discover the power of open-appsec WAF integrated with Docker SWAG for a seamless web app security solution
Christopher Lutat
Aug 7, 20249 min read


WAF Bypass: 7 Ways to Plug Your WAF Loopholes
Source Even an iron fortress around your organization won’t stop bad actors from trying to gain unauthorized access to sensitive...
Eyal Katz
Jul 1, 20246 min read


NGINX Proxy Manager WAF: New central WebUI management option for open-appsec
Discover the power of open-appsec WAF integrated with NGINX Proxy Manager (NPM) for a seamless web app security solution, now with a new cen
Christopher Lutat
May 29, 20243 min read


8 Web Application Security Best Practices for 2024
Web application security is the process of protecting APIs, websites, applications, and other online services from various threats.
Eyal Katz
Apr 17, 20247 min read


Top 10 Cloud WAF Solutions
Source Lists like the OWASP Top 10 in web application security read like a hacker’s shopping list: broken access control, authentication...
Eyal Katz
Apr 14, 20246 min read


Top 11 Advanced Threat Detection Tools for 2024
Threat detection tools are software systems designed to identify, analyze, and manage malicious activities.
Eyal Katz
Mar 21, 20246 min read


The Developer's Guide to OWASP API Security
We live in an API-driven world. But, just as APIs connect businesses and users globally, they also offer a gateway to malicious actors.
Eyal Katz
Mar 19, 20247 min read


Leveraging open-appsec / CloudGuard WAF for PCI DSS Requirement 6.4.1-2 Compliance
Learn how to leverage open-appsec / CloudGuard WAF for PCI DSS Requirement 6.4.1-2 Compliance.
Oriane Louzoun
Feb 25, 20243 min read


What is API Discovery, and How to Use it to Reduce Your Attack Surface
APIs are the bilingual translators of the software world, enabling applications to communicate with one another seamlessly.Â
Eyal Katz
Feb 25, 20246 min read


Top 10 Bot Detection Tools for 2024
Bot detection is the process of identifying beneficial and harmful automated bots that interact with websites or applications.Â
Eyal Katz
Feb 21, 20245 min read


What is Zero-Day Vulnerability? A Guide for 2024
A zero-day vulnerability is a digital time bomb that can go off at any time. These vulnerabilities are far more dangerous than others...
Eyal Katz
Feb 5, 20244 min read


Threat Detection and Response (TDR): What is it and Do You Need it?
Time is critical when a cyber-attack happens - every minute counts. Why wait to respond when an attack happens when you could get ahead?
Eyal Katz
Jan 29, 20244 min read
bottom of page