StrongBox IT

  • Home
  • Author: StrongBox IT
  • Page 11
strongboxit

What Is Broken Authentication?

Broken authentication is theft of user credentials, session tokens, keys, etc.. to gain unauthorized privilege. It is a threat inherent in an online platform or an application thereby enabling the hacker to bypass the authentication.  Attackers try broken authentication manually and attack them by using password lists and automated tools. Based on the system targeted, […]
Read More
strongboxit blog

SQL Injection Attack In Cybersecurity

An injection is a broad class of attack vectors where the attacker provides an altered input to a program. When the input gets executed as a part of a command or a query, the result obtained is completely altered. It is listed as the most dangerous threat in OWASP’s top 10 vulnerabilities. This flaw allows […]
Read More
strongboxit

What are the OWASP top 10 vulnerabilities?

OWASP The Open Web Application Security Project (OWASP) is an online nonprofit initiative that derives a set of rules or protocols, articles, methodologies in the field of cyber security. It works on an open-source model where various users contribute tools, forums, and projects. OWASP is the repository of web application security modules. ModSecurity ModSecurity is […]
Read More
strongboxit

Why cybersecurity is important in healthcare?

In the current scenario, healthcare leaders are extra equipped to increase spending on cybersecurity. But with new threats uncovered every day, it is exhausting to recognize where an organization would be better off investing its budget. Many healthcare corporations have a range of specialized hospital data systems such as EHR systems, e-prescribing systems, practice management […]
Read More
strongboxit

Installing Modshield SB from the GCP Marketplace

Step 1:Open the GCP Marketplace listing page that suits your licensing model (Cloud / BYOL), and click on the Launch button.   Step 2: Provide a suitable instance name for your new deployment. Change the Deployment Zone and Machine Type if required, while it’s recommended to use the deployment template defaults. Disk Size can be […]
Read More
strongboxit blog

Why Application Security Testing is Critical for Organization

According to an article in CIO magazine, a typical USD500+ million organization has 3,000+ applications. While average, organizations (excluding financial firms) have around 600 business-critical applications. On the other hand, financial firms have about 800 business-critical applications. Every day growing numbers of both small and large enterprises are falling victim to hackers, resulting in data […]
Read More
strongboxit

Top 4 Points to Consider when selecting an Web Application Firewall (WAF)

Web Application firewalls have, for a long, served as one of the enterprise’s important security technologies. But even as hackers have gotten sharper at avoiding traditional security, application firewalls have maintained their value. If your enterprise is considering a web application firewall for the first time or looking to replace an existing one, ensure you […]
Read More
strongboxit

Web Application Firewalls (WAF) and its Advantages

With the accelerated rise in the number of companies adopting cloud for running business applications and saving private data, cyber criminals have started to target web applications and websites. This has led to an ever-increasing need for web application Firewalls. According to an IBM report, the average cost of a data breach to enterprises is […]
Read More
strongboxit

Installing Modshield SB from the Azure Marketplace

Step 1:Select your preferred plan (either Cloud or BYOL) from the provided dropdown menu, and click Continue button Step 2: Click on Create button to configure various deployment settings <Step 3: Provide name for your new instance and change size if required from the available list Step 4: Configure your login username and authentication method in the […]
Read More
strongboxit

How an application firewall like Modshield SB could have saved the day

Freepik, a top-100 Alexa ranked popular website that provides access to free stock photos and design graphics, announced on Friday (21 August) that it had been subject to a major data breach due to a SQL injection vulnerability. In a statement released by the company, it is said that they immediately notified authorities of the […]
Read More
strongboxit

Installing Modshield SB from the AWS Marketplace

Step No: 1 Visit the marketplace page of the version that better suits your needs (Cloud / BYOL). Click on “Continue to Subscribe” button Step No: 2 Read and confirm that you accept the End User Licence Agreement (EULA) Step No: 3 You should see the status as “Pending” for a while when AWS processes your request, which should […]
Read More
Cart

No products in the cart.

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare