Tag: WAF

Web Application Firewall: A Crucial Element to Your Cybersecurity Success

In this blog, we’ll outline the benefits of a Web Application Firewall and what to look for and consider when choosing a WAF solution.

May 14, 2024

How a DDoS Attack Works: History, Mitigation and Remediation

Distributed Denial of Service (DDoS). The words and the letters themselves create foreboding. Whatever it is, it is bad. Hackers do it, it causes damage, and only IT pros seemingly …

September 22, 2022

The Landscape of DDoS Attacks and Guidance to Prepare Your Defense for 2022’s Most Common DDoS Attacks

Businesses of all sizes, in all industries, are vulnerable to DDoS attacks. This statement is as true today as it was when I first wrote about the state of DDoS …

September 13, 2022

How to Choose a Load Balancer: 5 Tips for Finding the Best Load Balancing Solution

If you were in IT in the mid-90s, you may have heard of load balancing. These were low-level hardware devices designed to distribute traffic across the network and focused largely …

September 8, 2022

Enhancing Day-One Exploit Containment with Custom WAF Rules

Bridging the gap between when a vulnerability announcement is released and when a fix is available. We live in a world where the good guys are constantly responding to threats …

August 5, 2022

Secure and Optimize eHealth Applications and Gain Reliable Delivery, Resiliency

eHealth applications are reshaping healthcare as we know it and modernizing how healthcare providers:  Compile and store computer-based patient records  Schedule patients, physicians, technicians, and facilities   Store and retrieve digital …

July 19, 2022

Legacy Application Security 101: Protecting enterprises from malicious cyberattacks

Many organizations have legacy applications in use that are delivering essential business functionality. But many of these applications cannot use modern security features available to those built on current technology …

June 9, 2022

A, B, C, D, E(LK) plus LM WAF Equals stunning visualization!

This blog will run through creating dashboards in the ELK (Elasticsearch, Logstash, Kibana) Stack to gain further insight into the LoadMaster WAF (Web Application Firewall). ELK Stack The ELK Stack …

January 20, 2022

Power(Shell) your WAF deployment

It is nice to develop scripts that you can use to configure your load balancer and Web Application Firewall (WAF).  The scripts can help integrate these services into your network orchestration …

October 7, 2021

Web Application Firewall (WAF) Insight

This blog details the format of the JavaScript Object Notation (JSON) logs that the LoadMaster Web Application Firewall (WAF) produces and demonstrates how those logs can be exported in real-time from the LoadMaster and provided to log data endpoints including ELK stack and Azure Sentinel.

September 10, 2020

Kemp Security Series 2020 – Part 4: LoadMaster and SIEM Log Analysis

Kemp LoadMaster is a great addition to any application delivery or general network infrastructure. In addition to features like application delivery, load balancing, SSL/TLS offloading, and authentication, LoadMaster also helps protect against common web security threats.

June 3, 2020

Best Federal Practices for Application Delivery

Organizations execute their missions based on available resources. Availability is critical whether it is facilities, personnel, processes, or technologies. For you to be able to depend on your information technology, …

May 13, 2020

Kemp Default Blog Image

Using a WAF to help Deliver PCI DSS

If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …

November 2, 2016

Kemp Default Blog Image

Application Centric DDOS Protection

Introduction Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have been a prevalent method of disrupting service delivery from websites and other Internet based services for years. …

August 3, 2016

OWASP Top Ten Series: Missing Function Level Access Control

Missing Function Level Access Control What is the vulnerability? Web applications typically only show functionality that a user has the need for and rights to use in the UI on …

December 9, 2015

Cross-Site-Scripting

OWASP Top Ten Series: Cross Site Scripting

Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …

October 13, 2015

Kemp Default Blog Image

OWASP Top Ten Series: Security Misconfiguration

Security Misconfiguration Modern web applications are built from many different parts. There are front end components such as a web browser, a desktop application with embedded web viewer, or increasingly …

August 11, 2015

WAF – Web Application Firewall 101

Traditional network firewalls placed in front web servers offer protection by limiting webserver access to the HTTP and HTTPS protocol ports – normally port 80 and 443. This approach prevents …

November 25, 2014