Threat detection is at the core of a WAF’s capabilities to accurately identify and block incoming attacks. However, not all threat engines are built the same. Many cloud WAF vendors use ModSecurity’s engine, an open-source web application firewall, for their core ruleset. This core rule set contains a set of generic attack detection rules that provide protection a ...
What Are Some Barriers That Web Hosting Providers Face in Deploying a WAF?
Website owners rely on web hosting providers to get their websites up and running online. But here’s the thing that may stumble some website owners: Hosting providers are only responsible for protecting the server in which websites are hosted, but customers will need to protect their own websites within the server. Bottom line: Web hosting providers are not respon ...
My Cloud WAF Service Provider Suffered a Data Breach…How Can I Protect Myself?
In the age of information, data is everything. Since the implementation of GDPR in the EU, businesses around the world have grown more "data conscious;" in turn, people, too, know that their data is valuable. It’s also common knowledge at this point that data breaches are costly. For example, Equifax, the company behind the largest-ever data breach, is expected to pay at least $ ...