Featured Stories

Latest Stories

LoadMasterESP

Pre-Authentication with AAD Domain Services in Azure

As new features are added to the public cloud, we need to continuously re-analyze the products we use to see what we are able to take advantage of. Recently, Microsoft …

February 17, 2016

Kemp Default Blog Image

Top 15 consideration before deploying Skype for Business Server 2015 in your Environment

Skype for Business has replaced Lync Server 2013 in Microsoft’s messaging portfolio. It combines the features from the previous release of Skype and Lync Server to deliver a premier component …

February 15, 2016

Microsoft DirectAccess Remote Access (VPN) with Windows 10 and Server 2012

UPDATE: If you currently use DirectAccess, we recommend that you investigate the newer Microsoft Always On VPN functionality. For more information on load balancing Microsoft’s recommended solution read Application Experience for …

December 16, 2015

OWASP Top Ten Series: Missing Function Level Access Control

Missing Function Level Access Control What is the vulnerability? Web applications typically only show functionality that a user has the need for and rights to use in the UI on …

December 9, 2015

Kemp Default Blog Image

KEMP Technologies – The only Visionary ADC Vendor

This month marked an exciting milestone for KEMP, and for me personally, as CEO of the company. Gartner published the 2015 Magic Quadrant for Application Delivery Controllers on October 6, …

October 20, 2015

Cross-Site-Scripting

OWASP Top Ten Series: Cross Site Scripting

Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …

October 13, 2015

Kemp Default Blog Image

OWASP Top Ten Series: Security Misconfiguration

Security Misconfiguration Modern web applications are built from many different parts. There are front end components such as a web browser, a desktop application with embedded web viewer, or increasingly …

August 11, 2015

OWASP Top Ten Series: Broken Authentication & Session Management

Broken Authentication and Session Management Securely authenticating users, managing their sessions when connected, and ensuring proper logout when the sessions end are essential activities when delivering web applications. As are …

July 17, 2015

Reverse Proxy for Skype for Business

Microsoft Skype for Business is a robust and easy to use collaboration platform. It provides employees with tools that allow them to collaborate from anywhere, at any time, on any …