Cloudbric’s Remote Access Solution is a cloud-based, secure remote working solution for businesses. It connects users to their workplace by sending all traffic through a secure and encrypted connection. Only authenticated users will be able to access your company information and data, regardless of device or access location.  Hassle-Free Secure Remote Access One of the biggest benefits of Cloudbric’s Remote Access Solution is that it is a hands-off solution. This means that minimal effort is
Announcements   , , ,
secure remote working computer
The COVID-19 pandemic has directly affected our lives all around the world, not only the way we live but also the way we work.  Many businesses in the world now have drastically changed their operations by going online and having employees connect to corporate networks.  Remote access vulnerabilities This type of remote working or remote access during COVID-19 has opened up many vulnerabilities in cyberspace which can leave businesses vulnerable.  With hasty transitions in dire
Feature Updates   , , , , ,
swap waf ddos ssl
Background: How did SWAP (Smart Web Application Protection) come to be? As many are aware, Cloudbric entered the web application security field with the support of Penta Security Systems, Asia’s top cybersecurity vendor. Cloudbric spun off as its own independent cloud security company bringing over 20 years of IT experience. Now, we offer SWAP, DDoS protection, and SSL-as-a-service together as a cloud-based solution for complete web protection.  The web application firewall (WAF) market was valued
Feature Updates   , , , ,
swap smart web application protection security
In recent months, Cloudbric has overdone a major brand redesign. Along with a new look, we’re pleased to announce SWAP. SWAP is a cloud-based web application protection solution based on artificial intelligence.  Previously, Cloudbric released the beta launch of its machine learning AI (artificial intelligence) engine for users to test out via their security dashboards. Now, this soon to be patented AI technology is at the very core of SWAP.  WAP incorporates the revolutionary AI-based
Web Security Tips   , , ,
Data protection laws around the world are changing the way businesses handle customer data. The healthcare industry, in particular, is under scrutiny due to the rise of high-profile cyberattacks aimed at some of the biggest healthcare providers.  Health organizations around the world are faced with numerous challenges so far as privacy laws and industry regulations are concerned.  Challenges for the healthcare industry regarding customer data Whether it’s lax access control, outdated software systems, or overall
Web Attacks & Trends   , ,
WAFs are among the most common security controls used by organizations in both the public and private sectors to protect their web applications against common web exploits. Driven by the extensive growth in attack volume against web applications, the global WAF market size is expected to reach $6.89 billion by 2024. What else is driving this growth across industries? Driver of WAF adoption In a research study by Computing, 62% of  IT decision makers surveyed
Web Security Tips   , , ,

October 14, 2019

3 Ways to Secure WAF APIs

In a recent cloud WAF hacking, many customers were alarmed when private API keys, salted passwords, and SSL certificates were revealed to have been compromised. It’s clear from this specific hacking incident that the appropriate steps were not taken to protect customers’ data. One proper security measure that was overlooked was API security. API security is concerned with the transfer of data connected to the internet, which means broken, exposed, or hacked APIs can lead
Web Attacks & Trends   , ,
In an age where hosting infrastructure in a cloud environment becomes more and more attractive – whether for maintenance, price, availability, or scalability – several service providers offer different PCI-DSS (Payment Card Industry – Data Security Standard) compliant solutions for their customers’ need to deal with payment cards. Many companies believe that when choosing a business partner already certified in PCI-DSS, no further action is required since this environment has already been evaluated. However, while
Guest Contributor   , ,
Threat detection is at the core of a WAF’s capabilities to accurately identify and block incoming attacks. However, not all threat engines are built the same. Many cloud WAF vendors use ModSecurity’s engine, an open-source web application firewall, for their core ruleset.  This core rule set contains a set of generic attack detection rules that provide protection against many common attack categories, including SQL Injection (SQLi), Cross Site Scripting (XSS), Local File Inclusion (LFI), Remote
Web Attacks & Trends   , , ,
Website owners rely on web hosting providers to get their websites up and running online.  But here’s the thing that may stumble some website owners: Hosting providers are only responsible for protecting the server in which websites are hosted, but customers will need to protect their own websites within the server.  Bottom line: Web hosting providers are not responsible for the security of websites themselves. What some web hosting providers may not realize is that
Cloudbric Tips & Tricks   , ,