In this blog, we’ll outline the benefits of a Web Application Firewall and what to look for and consider when choosing a WAF solution.
by Doug Barney
May 14, 2024
Distributed Denial of Service (DDoS). The words and the letters themselves create foreboding. Whatever it is, it is bad. Hackers do it, it causes damage, and only IT pros seemingly …
by Doug Barney
September 22, 2022
Businesses of all sizes, in all industries, are vulnerable to DDoS attacks. This statement is as true today as it was when I first wrote about the state of DDoS …
September 13, 2022
If you were in IT in the mid-90s, you may have heard of load balancing. These were low-level hardware devices designed to distribute traffic across the network and focused largely …
September 8, 2022
Bridging the gap between when a vulnerability announcement is released and when a fix is available. We live in a world where the good guys are constantly responding to threats …
August 5, 2022
eHealth applications are reshaping healthcare as we know it and modernizing how healthcare providers: Compile and store computer-based patient records Schedule patients, physicians, technicians, and facilities Store and retrieve digital …
by Frank Cotto
July 19, 2022
Many organizations have legacy applications in use that are delivering essential business functionality. But many of these applications cannot use modern security features available to those built on current technology …
by Kurt Jung
June 9, 2022
This blog will run through creating dashboards in the ELK (Elasticsearch, Logstash, Kibana) Stack to gain further insight into the LoadMaster WAF (Web Application Firewall). ELK Stack The ELK Stack …
January 20, 2022
It is nice to develop scripts that you can use to configure your load balancer and Web Application Firewall (WAF). The scripts can help integrate these services into your network orchestration …
October 7, 2021
This blog details the format of the JavaScript Object Notation (JSON) logs that the LoadMaster Web Application Firewall (WAF) produces and demonstrates how those logs can be exported in real-time from the LoadMaster and provided to log data endpoints including ELK stack and Azure Sentinel.
September 10, 2020
Kemp LoadMaster is a great addition to any application delivery or general network infrastructure. In addition to features like application delivery, load balancing, SSL/TLS offloading, and authentication, LoadMaster also helps protect against common web security threats.
June 3, 2020
Organizations execute their missions based on available resources. Availability is critical whether it is facilities, personnel, processes, or technologies. For you to be able to depend on your information technology, …
by Mike Bomba
May 13, 2020
If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …
November 2, 2016
Introduction Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been a prevalent method of disrupting service delivery from websites and other Internet based services for years. …
August 3, 2016
Missing Function Level Access Control What is the vulnerability? Web applications typically only show functionality that a user has the need for and rights to use in the UI on …
December 9, 2015
Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …
October 13, 2015
Security Misconfiguration Modern web applications are built from many different parts. There are front end components such as a web browser, a desktop application with embedded web viewer, or increasingly …
August 11, 2015
Traditional network firewalls placed in front web servers offer protection by limiting webserver access to the HTTP and HTTPS protocol ports – normally port 80 and 443. This approach prevents …
November 25, 2014