Camila Lederman

How to protect your organization against the OWASP Top 10?

The Open Web Application Security Project (OWASP) is an open community of application security experts from around the world, each sharing their expertise and working collaboratively to identify the most significant security vulnerabilities inherent in web applications and services.

SQL Injection

The family of SQL (Structured Query Language) injections includes a large number of vulnerabilities that have in common the interaction with an SQL database.

Anti-DDoS protection: choose UBIKA

Recognising and reducing distributed denial of service (DDoS) attacks is a major challenge today. Companies, whether very large, medium or small, can all be scapegoats when it comes to such attacks. There are specific actions that can boost your company’s overall security posture and make it strong enough to defend your business against DDoS attacks.

WAF DDoS: how to protect yourself with Cloud Protector

The Web Application Firewall (WAF) protects web applications and APIs against various attacks such as those highlighted in the OWASP Top 10 (SQL injections, cross-site scripting (XSS) etc.), application layer denial of service (DoS) attacks such as amplification or Slowloris attacks, zero day attacks etc. It filters, analyses and blocks the content of HTTP / HTTPS requests in incoming traffic, based on their behaviour and logic. This protects your web resources from malicious users and distinguishes legitimate users from unwanted DDoS traffic.

DDoS attack: an organization’s worst nightmare

DoS and DDoS are common attacks that can make your server unavailable, if not taken seriously. In both attack scenarios, the basic principle is that cybercriminals deprive legitimate users of the service they need by making your system inaccessible. In the following sections, we will understand their main differences, the impact, the reasons for DDoS and the types of attacks.