890

Are You Protecting Against Internal Data Breaches?

When prompted with the word “hacking,” often times, people’s first thought is of a guy sitting in the dark on his laptop trying to access a company’s server hundreds of miles away. However, according to Infosecurity Europe, 42% of security professionals consider hack attacks to come from day-to-day activities like insider threats.  Although the media often ta ...

789

Is WordPress Safe to Use For My Online Business?

WordPress is the most popular CMS If you’ve ever built a website or own an online business, there’s a good chance that you’ve heard of WordPress. WordPress is the most famous website building Content Management System (CMS) in the world today. Not only is it the most famous, but it is also the most widely used CMS in the world. VentureBeat recently announced that Wo ...

678

How Cloudbric Prevents Data Leakage: Parameter Tampering

Parameter tampering can manipulate web applications As we all know, many data breaches are caused by web attacks. A large majority of web attacks aim to access or send unauthorized requests to a web server in order to disclose outgoing sensitive data coming from the web server. To protect against these attacks, Cloudbric works hard to not only monitor incoming website traffic, but to ...

567

2015 Web Attack Trends Infographic

Check out our latest infographic for web attack trends for the first half of 2015. This data is based on WAPPLES (Penta Security's hardware WAF appliance) and Cloudbric (Cloud WAF) customer web traffic data from January to June 2015. All customers consented to the collection and dissemination of web attack data. Web Attack Infographic Look for the latest news in cyberse ...

pc-185837_1920

Does your WAF Service Have a Low False Positive Rate?

As cybersecurity threats continue to increase, corporations’ cybersecurity budgets continue to grow. In recent years, in order to protect their cyber assets, companies have started investing in strong programming talent, robust cybersecurity internal protocols and even higher physical security in their facilities. However, when companies come to the decision to choose a protection ...