Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Publications

Evolution of Real Time Attack Detection

Attack detection is critical for most security solutions, whether we are talking about a load balancer-based (NIDS, WAF), host-based or in-application solutions (HIDS, RASP). Interestingly, regardless of the differences in architecture and data flow, most solutions use similar detection principles and techniques. We will explore how the detection architecture evolved over time and how the new generation of detection logic, such as the architecture implemented by Wallarm, is principally different from that of the legacy solutions.

Wallarm AI Engine: How It Works

The main task of the run-time application security is to protect modern applications and APIs. In this endeavor the solutions face a number of challenges: Download this whitepaper to learn how Wallarm solves the difficult task of effective application security by relying on AI and machine learning including a unique combination of hierarchical clusterization, statistical n-gram based models, recurrent neural networks and reinforcement learning.

Navigate Your Hybrid Cloud Journey with Opti9

According to the FBI's Internet Crime Report, businesses suffered a $6.9 billion loss due to cybercrimes in 2021. This resulted in a loss of revenue, reduced customer trust, and expensive compliance penalties for thousands of organizations across the states. So the question is no longer why you should move to the cloud, but when and how?

A CISO's Guide to Cloud Application Security

The following guidelines will help senior stakeholders set strategy to secure modern applications, learning: Applications are the operational mechanism for how a modern enterprise conducts transactions and uses data. Whether internal or customer-facing, apps are critical for your successful business operations. That means securing apps should be a business priority.