Cybersecurity

What is SNI?

Server Name Indication (SNI) is an extension to the Transport Layer Security (TLS) protocol by which a client specifies which hostname (or domain name) it is attempting to connect to at the start of the TLS/SSL handshaking process.  To understand what this definition actually means and how it works, let’s break it down into 3 …

What is SNI? Read More »

Firewall vs. WAF

In this age of sophisticated IT and advanced digital innovations, it is vital for companies to understand the online threats they might face and what the security defenses they can use to protect themselves. Historically, companies have protected their devices and user data with a network firewall, commonly known as firewall. However, as internet technology …

Firewall vs. WAF Read More »

What is an SSL certificate?

When we go online shopping or banking, for security, we expect to see the website to have both the “HTTPS” and the secured lock icon on the address bar. But what does this “HTTPS” and lock icon actually mean?  To answer these questions we need to understand HTTPS, SSL protocol, and SSL certificates. On HTTPS, …

What is an SSL certificate? Read More »

What are the Top 10 OWASP threats?

The OWASP, also known as “Open Web Application Security Project”, is an internationally recognized non-profit organization solely dedicated to the security of web applications. It was first developed in 2003. The OWASP has one core principle that every material is available to the public for free, and everyone can improve their web application security. The …

What are the Top 10 OWASP threats? Read More »

What is token authentication?

Via token authentication features, users can implement access control via URL parameters or HTTP request headers without having to build complex back-end systems Take mlytics platform as an example, we will check these tokens at the Web Application Firewall (WAF) before any request is relayed to an origin. If the token is not valid the request is …

What is token authentication? Read More »

Mitigating a DDoS attack

The DDoS mitigation is a process of protecting the targeted network from the anticipated DDoS attack. A special purpose network equipment or an alternative cloud-based security measures are used for protecting the networks from attackers. Typically, a DDoS mitigation process consists of 4 steps: The detection of possible traffic flow anomalies that may indicate the …

Mitigating a DDoS attack Read More »

How does WAF work?

WAF usually resides in front of web servers, by placing a filtration barrier between the targeted server and the attacker. the WAF is able to protect against attacks like cross-site forgery, cross-site scripting and SQL injection in real time. Learn more about mlytics Enhanced Security feature. Working model Positive Security Model – PSM or Whitelisting only allows web …

How does WAF work? Read More »

What is web application security?

Nearly every business organization has a website or several websites which they use to offer their services as well as interact with their customers. Websites are beneficial since they enable a company to offer its services twenty-four hours, seven days a week. Such web-based services normally involve the exchange of a lot of sensitive information …

What is web application security? Read More »