top of page

Blogs
cra-ready.org - a Practical Guide to Cyber Resilience Act (CRA) Compliance
CRA-Ready.org is built to help businesses understand and meet the requirements of the European Union’s Cyber Resilience Act (CRA). The CRA introduces mandatory cybersecurity obligations for all digital products—software and connected hardware—sold in the EU. This includes consumer apps, industrial control systems, IoT devices, and even open-source components used in commercial contexts.
Editorial
Jun 22 min read
Scaling WAF Protection Across Multi-Cloud Environments with open-appsec
As organizations embrace the flexibility and resilience of multi-cloud and hybrid architectures, a new challenge emerges: how do you...
Oriane Louzoun
May 293 min read


open-appsec vs Traditional WAFs: What Can You Gain by Going Cloud-Native and Open Source
While traditional Web Application Firewalls (WAFs) have long been the go-to solution for protecting web applications, modern architectures demand a new approach. In this blog, we’ll explore the key differences between open-appsec and traditional WAFs — and why organizations are making the switch.
Oriane Louzoun
May 233 min read


Akamai WAF: Complete List of Pros and Cons
Could your web app be under attack as we speak? Cyber attackers and automated bots are moving in the shadows, quietly looking for weak...
Eyal Katz
Apr 36 min read


Web Application Firewall Infrastructure: A Developer's Guide
Developers have a lot on their plates, juggling feature development, bug fixes, and tight deadlines. Sadly, security often becomes an...
Eyal Katz
Mar 66 min read


Best Cyber Asset Attack Surface Management Tools for 2025
New devices, cloud services, and third-party applications connect to your network every single daily. Each new system and tool acts as a...
Eyal Katz
Mar 65 min read


Top 10 Insider Threat Detection Software
Unlike external attacks that try to break in, insider threats come from employees, contractors, or compromised accounts that already have...
Eyal Katz
Mar 66 min read


Insider Threat Detection: The Essential Guide
"Keep your friends close and your enemies closer." Maybe this statement is uncomfortably close to the truth of insider threats—can you...
Eyal Katz
Mar 36 min read


The Essential API Security Checklist
Juggling many different tasks at once often means losing focus on the task at hand. It's the age-old problem with API security—there's so...
Eyal Katz
Nov 28, 20245 min read


The DevOps Guide to WAF API Gateways
The rise of custom and cloud-native applications sets off alarm bells for many DevOps teams and their organizations. Although innovation...
Eyal Katz
Oct 20, 20247 min read


10 Features Every WAF Must Have
Innovations like machine learning have transformed web application firewalls (WAFs) and enabled them to keep up with the explosive growth...
Eyal Katz
Oct 20, 20246 min read


How to Configure AWS WAF Rules Correctly
This blog explains how to configure AWS WAF rules correctly in order to maximize the security of your web applications and APIs.
Eyal Katz
Oct 20, 20246 min read


WAF Bypass: 7 Ways to Plug Your WAF Loopholes
Source Even an iron fortress around your organization won’t stop bad actors from trying to gain unauthorized access to sensitive...
Eyal Katz
Jul 1, 20246 min read


8 Web Application Security Best Practices for 2024
Web application security is the process of protecting APIs, websites, applications, and other online services from various threats.
Eyal Katz
Apr 17, 20247 min read


Top 10 Cloud WAF Solutions
Source Lists like the OWASP Top 10 in web application security read like a hacker’s shopping list: broken access control, authentication...
Eyal Katz
Apr 14, 20246 min read


Top 11 Advanced Threat Detection Tools for 2024
Threat detection tools are software systems designed to identify, analyze, and manage malicious activities.
Eyal Katz
Mar 21, 20246 min read


The Developer's Guide to OWASP API Security
We live in an API-driven world. But, just as APIs connect businesses and users globally, they also offer a gateway to malicious actors.
Eyal Katz
Mar 19, 20247 min read


What is API Discovery, and How to Use it to Reduce Your Attack Surface
APIs are the bilingual translators of the software world, enabling applications to communicate with one another seamlessly.Â
Eyal Katz
Feb 25, 20246 min read


Top 10 Bot Detection Tools for 2024
Bot detection is the process of identifying beneficial and harmful automated bots that interact with websites or applications.Â
Eyal Katz
Feb 21, 20245 min read


What is Zero-Day Vulnerability? A Guide for 2024
A zero-day vulnerability is a digital time bomb that can go off at any time. These vulnerabilities are far more dangerous than others...
Eyal Katz
Feb 5, 20244 min read
bottom of page