How Akamai Augments Your Security Practice to Mitigate the OWASP Top 10 Risks

January 16, 2019

The OWASP Top 10 provides a list of the most common types of vulnerabilities often seen in web applications. To call out a common misperception often perpetuated by security vendors, the OWASP Top 10 does not provide a checklist of attack vectors that can be simply blocked by a web application firewall (WAF). Instead, its objective is to raise awareness about common security vulnerabilities that application developers should consider, drive that awareness across an array of development practices, and help instill a culture of secure development.

Spotlight

Wazuh, Inc.

Wazuh is an IT security startup based in the Silicon Valley area of California and operating worldwide. Wazuh provides support and professional services to companies using or planning to use Open Source SECurity (OSSEC) host intrusion detection system (HIDS). Wazuh contributes to the existing OSSEC HIDS project, maintaining installers for multiple platforms and creating new rules for threat detection. Additionally, Wazuh actively develops it’s own OSSEC fork, free Open Source (GPLv2), creating new unique features and extra capabilities that position our company as the leader in the Open Source Endpoint Security space.

OTHER WHITEPAPERS
news image

2022 Global Cybersecurity Awareness Training Study

whitePaper | August 31, 2022

The benefit awareness cybersecurity awareness training, particular phishing simulations, have gained wide acceptance in business and the public sector.

Read More
news image

IoT Cybersecurity vision 2018-2019

whitePaper | November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Read More
news image

NMS Security Architecture Considerations & Approaches

whitePaper | August 26, 2022

The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Sharkgate Whitepaper

whitePaper | December 11, 2019

SharkGate specializes in protecting websites and has geared up to build the next-generation of website cyber protection: SharkGate is creating the World’s first distributed ledger powered Cyber Security solution designed exclusively to protect websites against hackers. SharkGate is taking a new approach that will change website security as the industry knows it and make the next-generation of cyber protection available to all websites worldwide.

Read More

Spotlight

Wazuh, Inc.

Wazuh is an IT security startup based in the Silicon Valley area of California and operating worldwide. Wazuh provides support and professional services to companies using or planning to use Open Source SECurity (OSSEC) host intrusion detection system (HIDS). Wazuh contributes to the existing OSSEC HIDS project, maintaining installers for multiple platforms and creating new rules for threat detection. Additionally, Wazuh actively develops it’s own OSSEC fork, free Open Source (GPLv2), creating new unique features and extra capabilities that position our company as the leader in the Open Source Endpoint Security space.

Events