IMMUNIO
Stop Account Takeover in its Tracks
It seems that everyday we see headlines announcing a data breach that resulted in theft of information for hundreds of thousands, millions, or even billions of users. These are clearly brand damaging headlines, and the numbers are certainly daunting, but internalizing a list of user credentials numbered in the billions can feel abstract. What real harm could […]
IAST, RASP, and Runtime Instrumentation
The Application Security Testing (AST) technology market is made up of the following categories: 1st Gen SAST (Static Application Security Testing) DAST (Dynamic Application Security Testing) WAF (Web Application Firewall) 2nd Gen IAST (Interactive Application Security Testing) RASP(Runtime Application Self-Protection) There are other categories that can be lumped into AppSec as well, such as developer […]
Bot Fingerprinting
A web bot is designed to make life on the web easier; a script that automates repetitive tasks and does them much faster than a human could. This speed is often how you can tell who or what is interacting with your site: bot or human. And when it comes to securing your web apps […]
Web Application Health
The reality of today’s world is that there is no clear perimeter to an organization’s information systems. That means that controlling the network edge is no longer the way to effectively secure web applications or an entire system. Access control, which was once the gold standard for protection, is no longer enough. Because of their […]
RASP and Security Against Internal Breaches
As companies consider their application security posture, it is critical to remember that breaches can come from both outside and inside the company and its trust boundaries. Internal threats require just as much protection as external risks. While the Verizon 2016 Data Breach Investigations Report confirms that the most significant threats to a company is from external […]