Webapplication

Web Application Attacks – Types, Impact & Mitigation – Part-2Web Application Attacks – Types, Impact & Mitigation – Part-2

Web Application Attacks – Types, Impact & Mitigation – Part-2

With this article, we list some of the common Web Application Attacks part-2, impacts, and possible mitigation. In part -2…

2 years ago
Skipfish – Web Application Security Scanner for XSS, SQL Injection, Shell injectionSkipfish – Web Application Security Scanner for XSS, SQL Injection, Shell injection

Skipfish – Web Application Security Scanner for XSS, SQL Injection, Shell injection

Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying…

2 years ago
Web Application Security: A 2024 GuideWeb Application Security: A 2024 Guide

Web Application Security: A 2024 Guide

Web application security refers to the measures taken to safeguard web applications from potential attacks. It involves strategies and processes…

2 years ago
Web Application Penetration Testing Checklist – A Detailed Cheat SheetWeb Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application…

2 years ago
Secure Web Gateway (SWG) – A New Bulletproof Corporate Web Security To Protect Sophisticated Web AttacksSecure Web Gateway (SWG) – A New Bulletproof Corporate Web Security To Protect Sophisticated Web Attacks

Secure Web Gateway (SWG) – A New Bulletproof Corporate Web Security To Protect Sophisticated Web Attacks

The goal of Perimeter 81 from day one has been about providing cost-effective and cloud-based security solutions, such as our…

3 years ago
Kickstart Robust Cloud Security with the Industry’s Best Website Security ChecklistKickstart Robust Cloud Security with the Industry’s Best Website Security Checklist

Kickstart Robust Cloud Security with the Industry’s Best Website Security Checklist

Website security checklist and cloud security best practices have made it to the top of the must-have lists of organizations…

4 years ago
Web Application Attacks – Types, Impact & Mitigation – Part-4Web Application Attacks – Types, Impact & Mitigation – Part-4

Web Application Attacks – Types, Impact & Mitigation – Part-4

With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -4 we…

4 years ago
Web Application Attacks – Types, Impact & Mitigation – Part-3Web Application Attacks – Types, Impact & Mitigation – Part-3

Web Application Attacks – Types, Impact & Mitigation – Part-3

With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -3 we…

4 years ago
Web Application Attacks – Types, Impact & Mitigation – Part-1Web Application Attacks – Types, Impact & Mitigation – Part-1

Web Application Attacks – Types, Impact & Mitigation – Part-1

With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -1 we…

4 years ago
How Web Application Security Solution Helps Businesses of any size, from all Different Industry Verticals?How Web Application Security Solution Helps Businesses of any size, from all Different Industry Verticals?

How Web Application Security Solution Helps Businesses of any size, from all Different Industry Verticals?

A web application security solution can help businesses protect their apps and website from potential cyberthreats. Businesses of all sizes, across industries…

4 years ago