Introduction to SAST Application security testing makes applications more resilient to security threats and identifies weaknesses and vulnerabilities in application source code. Initial days software code testing was done manually however as organizations matured and software’s became modular in nature …
Introduction to Application Security Testing Application Security testing is an integral part of SDLC (Software development lifecycle) and used to discover the weaknesses, risks or threats in software applications and help to detect vulnerabilities hidden in applications which can be …
Introduction to Palo Alto Firewall is a network security device that permit or denies network access to traffic flows between an untrusted zone and a trusted zone. Palo Alto Firewall is one of the globally coveted and widely preferred Security …
Introduction Palo Alto has been considered one of the most coveted and preferred Next generation Firewall considering its robust performance, deep level of packet inspection and myriad of features required in enterprise and service provider domain. When troubleshooting network and …
The modern technologically advanced world not only opens the gate for new opportunities but also for new threats. One of them is Cryptojacking, a cybercrime that became more active in the past two decades. Is this your first time hearing …
In this article, we will understand the terminologies related to USER ID and their role w.r.t login monitoring, role discovery and related nuances. USER ID : PALO ALTO NETWORKS User Identification is a very unique feature of Palo Alto firewall …
ISP stands for Internet service provider they offer a wide variety of Internet services related to browsing, Email services, faxing capability, audio and video communications and hosting services etc. Let’s look more in detail about Internet service provider (ISP) and …
Introduction to CASB Solutions CASB (Cloud Access Security Broker) is an intermediary between cloud users and cloud applications. CASB solution is a software/hardware application that is located inside the network or works as a cloud-native application. Cloud access security broker …
Difference Between MD5 and CRC MD5 and CRC are 2 of most commonly used hashing algorithms, infact while comparing files and including other use cases. In this article. We will understand both the concepts of hashing algorithm and how one …
SSL Certificate types : Intermediate Certificate and Root Certificate When we look at the function of the SSL certificates at the first glance, then we would find that they are pretty straightforward. You would simply install it to your concerned …
A digital certificate, which is also termed as public key certificate is applied to cryptographically link up the ownership of public key to the entity owning the same. Here, we are going to get a better insight of what is …
Types of Attacks on Routers It is not possible to 100% prevent the router attacks. However, there are possibilities of few things that could be done for preventing the occurrence of most common attacks of routers on the network and …
Security Groups in AWS I am sure that while working on Security groups, we do ponder about Firewalls and Rules i.e. allowing or denying traffic based on hardware or software firewalls. In case of AWS security groups are very similar …
What is Proxy? Proxies (often called intermediaries in the SOA world) are hardware or software solutions that sit between the client and the server and do something to requests and sometimes responses. The most often heard use of the term …
NAT (NETWORK ADDRESS TRANSLATION) In computer networking, Network Address Translation (NAT) is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device. Network Address Translation (NAT) allows security administrators to overcome …
Firewalls are computer software programs that hinder illegitimate access to or from a personal network. They are used to improve security in a system of computers connected to a similar interface, including the Internet and LAN. Thus, they are a …
TOR (The Onion Router) is a software and open network which allows the users to browse the Web anonymously. TOR makes it difficult, if not impossible, for any snoops to see our web mail, search history, social media posts or …
Introduction to Torrenting Torrenting is a P2P (peer-to-peer) file sharing technology used to share files efficiently. This technology relies on a community of decentralized users for file sharing rather than being dependent on traditional single website or source for downloading. …
VPN (Virtual Private Network) is a technology that lets you access the web safely and privately. It acts like a secure tunnel between your device and the internet. The information traveling between a connected device (computer, smartphone, tablet) and a …
The differences between Traditional Firewall Next Generation Firewall are as follows – SOURCE:https://ipwithease.com Also refer Router IOS Firewall vs Firewall
The differences between NGFW and UTM are as follows – SOURCE:https://ipwithease.com
The differences between Firewall, IPS and IDS are as follows – SOURCE:https://ipwithease.com Also refer Network Based Firewall vs Host Based Firewall
The differences between Network Based Firewall and Host Based Firewall are as follows – SOURCE:https://ipwithease.com Also refer Firewall vs IPS vs IDS
Difference between Router IOS Firewall and Firewall SOURCE:https://ipwithease.com Also refer WAF vs Network Firewall
Difference between WAF and Network Firewall PARAMETER WAF NETWORK FIREWALL Philosophy A Web Application Firewall (WAF) is a network security firewall solution that protects web applications from HTTP/S and web application-based security vulnerabilities. Network Firewall is a device which controls …
Difference between Stateless Firewall and Stateful Firewall PARAMETERS STATELESS STATEFUL Philosophy Treats each packet in isolation and does not relates to connection state Stateful firewalls maintain context about active sessions and use “state information” to speed packet processing Filtering decision …