According to a recent Forrester Consulting research report commissioned by IBM, 78% of security decision-makers plan to implement or are unsure how to implement Secure Access Service Edge (SASE) in the next 12 months. A SASE solution can make a lot of sense for digitally driven organizations where remote employees…
Read More
Server-side templates provide an easy method of managing the dynamic generation of HTML code. But they can also fall victim to server-side template injection (SSTI). Take a look at the basics of server-side web templates, and how to detect, identify and mitigate SSTI in web applications. Server-side templates allow developers…
Read More
How can you tell when software is behaving strangely if you don’t know what the right behavior is? That’s an important question when it comes to threat actors. After all, attackers often hijack honest software, networks and systems for dishonest ends. To stop them with security tools, the first step…
Read More
As the mom of a recent high school graduate, I silently cringe when a well-meaning person asks where he is heading to college. I’d prefer they asked a more open-ended question about what his plans for the future are. In fact, my son is headed to a state university for…
Read More