<img height="1" width="1" style="display:none;" alt="" src="https://analytics.twitter.com/i/adsct?txn_id=nv7vl&amp;p_id=Twitter&amp;tw_sale_amount=0&amp;tw_order_quantity=0"> <img height="1" width="1" style="display:none;" alt="" src="//t.co/i/adsct?txn_id=nv7vl&amp;p_id=Twitter&amp;tw_sale_amount=0&amp;tw_order_quantity=0">

Web Application Security Blog

Who’s Responsible for Weak Passwords?

POSTED BY  Mike Milner on Sep 14, 2016
Sep 14 2016

When people choose weak passwords and reuse them across websites, they bear some responsibility for security breaches that impact them. Historically, this was where it stopped: if you got hacked, it was your fault. But as Account Takeover (ATO)...

Continue Reading ›

TOPICS     WAF vs. RASP  Internet of Things  Stolen Credentials

IoT Botnets: Is Your Website at Risk?

POSTED BY  Oliver Lavery on Sep 06, 2016
Sep 06 2016
It’s no secret at this point that web applications represent a significant weak spot in organizations’ network security. As Verizon reports in its 2016 Data Breach Investigations Report, the single most significant cause of data breaches in... Continue Reading ›

TOPICS     WAF  RASP  Internet of Things