Maurice McMullin was a Principal Product Marketing Manager at Progress Kemp.
The State of Application Experience [AX] 2019 Report from Kemp has highlighted some interesting points on how the move to cloud is changing the way applications are delivered. Moving to …
November 19, 2019
Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …
August 7, 2018
Injection attack remains at the A1 position on the latest 2017 OWASP Top 10 list of most prevalent security threats for web-based applications. It is straightforward to exploit on systems …
June 6, 2018
A10 – Underprotected APIs is one of two new additions to the OWASP Top 10 list of threats to web applications. The other new addition is A7 – Insufficient Attack …
September 11, 2017
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are significant and exciting developments in the field of computer networking. They are great individually, but when deployed together with automation …
July 25, 2017
Throughout history, civilizations have suffered from a false sense of security. One of the most famous incidents occurred during the war between Greece and Troy. The Trojans felt so confident …
November 3, 2016
If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …
November 2, 2016
Email is an essential business enabler in most organizations. Emails are also considered as legal transactions just like any other document created and circulated by a company. It is therefore …
June 28, 2016
Skype for Business has replaced Lync Server 2013 in Microsoft’s messaging portfolio. It combines the features from the previous release of Skype and Lync Server to deliver a premier component …
February 15, 2016
Missing Function Level Access Control What is the vulnerability? Web applications typically only show functionality that a user has the need for and rights to use in the UI on …
December 9, 2015
Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …
October 13, 2015
Security Misconfiguration Modern web applications are built from many different parts. There are front end components such as a web browser, a desktop application with embedded web viewer, or increasingly …
August 11, 2015