Azion’s WAF Is the Best Option for Businesses of All Sectors

Azion’s WAF Is the Best Option for Businesses of All Sectors

Boost your business cyber security with Azion's WAF, a flexible and cost-effective tool recognized for its excellence

FEB 9, 2024 • 9 min read

Rafael Rigues - Technical Researcher
The Experts Speak: Cybersecurity Quotes About Zero-Trust, WAF, Social Engineering, and More

The Experts Speak: Cybersecurity Quotes About Zero-Trust, WAF, Social Engineering, and More

Cybersecurity quotes to expand your strategic understanding of Zero Trust, WAF, social engineering, and more.

FEB 1, 2024 • 7 min read

Isidro Iturat Hernández - Technical Researcher
Five Ways HTTP/3 Can Increase the Security of Your Applications

Five Ways HTTP/3 Can Increase the Security of Your Applications

HTTP/3 offers many security improvements over previous versions, which can help to protect your web applications from a variety of threats, including man-in-the-middle and denial-of-service attacks, and session hijacking.

JAN 26, 2024 • 7 min read

Rafael Rigues - Technical Researcher
Enhance the security of your applications with the new Fingerprint feature of the Azion Marketplace

Enhance the security of your applications with the new Fingerprint feature of the Azion Marketplace

Improve your application security with the Azion Fingerprint feature, ensuring unique device identification. Scalable, and quick to implement. Try it today!

JAN 19, 2024 • 6 min read

Thiago Silva - Technical Researcher
Why did the WAF become essential for cybersecurity?

Why did the WAF become essential for cybersecurity?

A scenario dominated by evolving threats requires a tool that increases observability and offers protection against the most varied attacks, even unknown ones.

JAN 18, 2024 • 5 min read

Rafael Rigues - Technical Researcher
Signature-Based vs. Scoring-Based WAF

Signature-Based vs. Scoring-Based WAF

WAFs must evolve beyond a signature-based approach to protect against zero-day threats and maintain high performance.

NOV 28, 2023 • 6 min read

Rachel Kempf - Editor-in-Chief
How to Mitigate OWASP Top 10 Risks with Azion's WAF

How to Mitigate OWASP Top 10 Risks with Azion's WAF

How does Azion's Web Application Firewall help fight OWASP Top 10 threats? Find out here!

NOV 28, 2023 • 14 min read

Paulo Moura - Technical Researcher
Two Edge Computing Solutions that Enhance Online Experience for Large-Scale Events

Two Edge Computing Solutions that Enhance Online Experience for Large-Scale Events

Discover why Azion's Load Balancer and Application Acceleration are the key to preventing website failures during high-traffic events.

NOV 14, 2023 • 6 min read

Adriana Cedillo Morales - Technical Researcher
Remember Zero-Day Attacks Blocked by Azion's WAF

Remember Zero-Day Attacks Blocked by Azion's WAF

Learn how Azion's Web Application Firewall (WAF) prevents zero-day attacks from succeeding against your web applications.

NOV 6, 2023 • 4 min read

Paulo Moura - Technical Researcher
Seven Questions You Should Ask Before Choosing a WAF

Seven Questions You Should Ask Before Choosing a WAF

Uncover key aspects and determining factors for choosing a Web Application Firewall (WAF) for your company.

OCT 27, 2023 • 6 min read

Paulo Moura - Technical Researcher
New Real-Time Metrics Features Offer Enhanced Observability

New Real-Time Metrics Features Offer Enhanced Observability

Upgraded functionality will provide enhanced observability for applications, with powerful real-time visualization into performance, availability and security

OCT 3, 2023 • 2 min read

Azion Technologies -
Zero Trust Journey | Phase 4: Implementation

Zero Trust Journey | Phase 4: Implementation

Discover how to implement a simplified Zero Trust architecture.

AUG 21, 2023 • 8 min read

Jonas Ferreira - Solutions Architect
Paulo Moura - Technical Researcher
5 security solutions to easily protect your e-commerce website

5 security solutions to easily protect your e-commerce website

Learn how to deploy on your e-commerce platform the same security measures used by the largest retailers, without the need to modify applications or impact business continuity.

JUL 25, 2023 • 6 min read

Rafael Rigues - Technical Researcher
Zero Trust Journey | Phase 3: Access Control

Zero Trust Journey | Phase 3: Access Control

Find out how to build access control on a Zero Trust security model.

JUL 18, 2023 • 6 min read

Jonas Ferreira - Solutions Architect
Paulo Moura - Technical Researcher
Zero Trust Journey | Phase 3: Requirements for Access Control

Zero Trust Journey | Phase 3: Requirements for Access Control

Find out how to build access control on a Zero Trust security model.

JUN 29, 2023 • 9 min read

Jonas Ferreira - Solutions Architect
Paulo Moura - Technical Researcher
Control Access to Your Platform With Scheduled Blocking Function

Control Access to Your Platform With Scheduled Blocking Function

Learn how you can have application access control with Azion Scheduled Blocking Function. It's an edge function to control access applications based on time windows.

JUN 21, 2023 • 9 min read

Pablo Diehl - Serverless Software Developer
Vivian Seixas - Technical Researcher
Protect Your Application From Session Theft With Azion

Protect Your Application From Session Theft With Azion

Learn what cookie tampering attack is and how to mitigate this attack that alters user data to perform session theft, impersonation, and other malicious actions.

JUN 21, 2023 • 10 min read

Pablo Diehl - Serverless Software Developer
Vivian Seixas - Technical Researcher
Discover How Azion Cipher Suites Manages Your TLS Ciphers at the Edge

Discover How Azion Cipher Suites Manages Your TLS Ciphers at the Edge

Now Azion's graphical interface, Real-Time Manager, allows you to easily set up cipher suites for your edge applications with just a few clicks.

JUN 21, 2023 • 5 min read

Isidro Iturat Hernández - Technical Researcher
Why Choose the Azion WAF

Why Choose the Azion WAF

Discover the advantages of adopting Azion's WAF to protect your applications from known and emerging threats and from zero-day exploits.

JUN 13, 2023 • 7 min read

Thiago Silva - Technical Researcher
Now It's Much Easier to Get a Let's Encrypt TLS Certificate at Azion

Now It's Much Easier to Get a Let's Encrypt TLS Certificate at Azion

TLS certificates at your fingertips! See how much easier and faster it is to generate or renew a free SSL certificate from Let's Encrypt at Azion's Edge Computing Platform.

JUN 6, 2023 • 5 min read

Vivian Seixas - Technical Researcher
Azion Announces Solution That Blocks Oversized Requests

Azion Announces Solution That Blocks Oversized Requests

Find out why blocking oversized requests simplifies operations and gives you a competitive advantage. Get more security and performance for your applications with Azion's Limit Payload Size solution.

MAY 29, 2023 • 4 min read

Vivian Seixas - Technical Researcher
Zero Trust Journey | Phase 2: Planning

Zero Trust Journey | Phase 2: Planning

Understand the planning phase in the Zero Trust journey and how to succeed in it.

MAY 22, 2023 • 8 min read

Jonas Ferreira - Solutions Architect
Paulo Moura - Technical Researcher
Learn How mTLS Can Make Your Applications More Secure

Learn How mTLS Can Make Your Applications More Secure

Learn how mTLS can add an extra layer of trust to your applications and help you avoid common data theft attacks.

MAY 17, 2023 • 7 min read

Rafael Rigues - Technical Researcher
Azion Introduces a Feature to Optimize Threat Detection and Data Analysis

Azion Introduces a Feature to Optimize Threat Detection and Data Analysis

Azion introduces a new feature that helps organizations to optimize threat detection and data analysis.

MAY 15, 2023 • 4 min read

Lukas Cardoso - Product Manager
Adriana Cedillo Morales - Technical Researcher
Azion Obtains PCI DSS v4.0 Cybersecurity Certification

Azion Obtains PCI DSS v4.0 Cybersecurity Certification

With PCI DSS v4.0, Azion is prepared to support the payment card sector in facing the new challenges of today's cybersecurity. Find out how.

MAY 8, 2023 • 5 min read

Isidro Iturat Hernández - Technical Researcher
Azion Marketplace Adds Solution to Monitor and Block Suspicious Requests

Azion Marketplace Adds Solution to Monitor and Block Suspicious Requests

Monitor and block suspicious requests with the Request Variation Controller feature available on the Azion Marketplace.

APR 26, 2023 • 4 min read

Thiago Silva - Technical Researcher
Zero Trust Journey with Azion | Phase 1: Preparation

Zero Trust Journey with Azion | Phase 1: Preparation

Discover the preparation phase and how to execute it for your Zero Trust implementation.

APR 24, 2023 • 5 min read

Jonas Ferreira - Solutions Architect
Paulo Moura - Technical Researcher
What Is Data Loss Prevention and How Can I Protect My Business?

What Is Data Loss Prevention and How Can I Protect My Business?

Data loss prevention is technology that aims to detect and prevent the loss, leakage, or misuse of data through breaches, leaked transmissions, and unauthorized use.

APR 17, 2023 • 6 min read

Jonas Ferreira - Solutions Architect
Adriana Cedillo Morales - Technical Researcher
How Edge Computing Improves API Security

How Edge Computing Improves API Security

Find out how edge computing technology gives APIs a superior level of protection and integrity. Check it out!

APR 4, 2023 • 9 min read

Jonas Ferreira - Solutions Architect
Vivian Seixas - Technical Researcher
First Steps to Simplify the Zero Trust Model Adoption

First Steps to Simplify the Zero Trust Model Adoption

Discover how to simplify your zero trust journey by following best practices.

MAR 27, 2023 • 8 min read

Jonas Ferreira - Solutions Architect
Paulo Moura - Technical Researcher
Azion's WAF Is Not Vulnerable to the CRLF Injection Bypass

Azion's WAF Is Not Vulnerable to the CRLF Injection Bypass

Attack may affect products from many vendors. Tests prove the efficacy of Azion's WAF in protecting our customers from zero-day threats.

MAR 23, 2023 • 6 min read

Marcos Carvalho - Engineer
Rafael Rigues - Technical Researcher
Understand Zero Trust Security's Approach to Data Protection

Understand Zero Trust Security's Approach to Data Protection

Microsegmentation and access privilege restriction are some of the characteristics of Zero Trust Security that keep your data away from the hands of criminals.

MAR 20, 2023 • 6 min read

Rafael Rigues - Technical Researcher
Five Cybersecurity Risks in 2023 and How to Protect Yourself Against Them

Five Cybersecurity Risks in 2023 and How to Protect Yourself Against Them

Find out how using edge computing can mitigate today's most common cybersecurity risks.

MAR 15, 2023 • 7 min read

Jonas Ferreira - Solutions Architect
Adriana Cedillo Morales - Technical Researcher
5 Benefits of Edge Computing for Banking Technology

5 Benefits of Edge Computing for Banking Technology

Discover five benefits that edge computing can bring to traditional banks, fintechs and other companies in the financial sector.

FEB 27, 2023 • 9 min read

Fernanda Briones - Technical Researcher
Thiago Silva - Technical Researcher
Five Cases of IT Transformation with Edge Computing

Five Cases of IT Transformation with Edge Computing

Check out these five success stories from companies that have transformed their IT using edge computing.

FEB 15, 2023 • 17 min read

Paulo Moura - Technical Researcher
Is Banking Cybersecurity Improved by Edge Computing?

Is Banking Cybersecurity Improved by Edge Computing?

This blog post analyzes how banking cybersecurity is evolving in the edge computing universe.

JAN 24, 2023 • 8 min read

Isidro Iturat Hernández - Technical Researcher
DNSSEC on the Azion Edge Computing Platform

DNSSEC on the Azion Edge Computing Platform

Learn how DNSSEC works on Azion's Edge Computing Platform and how you can enable it to add an extra layer of protection for your websites and applications.

JAN 19, 2023 • 5 min read

Rafael Rigues - Technical Researcher
How Justa Has Been Evolving Its Technology to Meet Modern Digital Demands

How Justa Has Been Evolving Its Technology to Meet Modern Digital Demands

Justa was able to simplify compliance with PCI DSS and Brazil's Central Bank rules and increase the protection of transactions via PIX and QR Code carried out in its points of sales.

JAN 17, 2023 • 4 min read

Paulo Moura - Technical Researcher
What is DNSSEC?

What is DNSSEC?

Learn what is DNSSEC and how you can use it to add an extra layer of protection for the end users of your websites and applications.

JAN 5, 2023 • 7 min read

Rafael Rigues - Technical Researcher
The recent WAF Bypass attack does not affect Azion's Web Application Firewall

The recent WAF Bypass attack does not affect Azion's Web Application Firewall

A recently demonstrated technique allows an attacker to bypass some popular Web Application Firewalls (WAFs). But Azion customers are safe, learn why.

DEC 20, 2022 • 5 min read

Andrew Johnson - Product Marketing Manager
Marcos Carvalho - Engineer
Rafael Rigues - Technical Researcher
Azion Achieves SOC 3 Compliance

Azion Achieves SOC 3 Compliance

With SOC 3, Azion provides transparency into our security and availability controls by making information about our SOC 2 audit accessible to customers.

NOV 14, 2022 • 2 min read

Rachel Kempf - Editor-in-Chief
Demystifying Zero Trust Architecture: A Practical Guide

Demystifying Zero Trust Architecture: A Practical Guide

This blog will explain the components and reference architecture needed for effective zero trust security.

NOV 10, 2022 • 7 min read

Andrew Johnson - Product Marketing Manager
Rachel Kempf - Editor-in-Chief
How Edge Computing Solves Four Key IoT Challenges

How Edge Computing Solves Four Key IoT Challenges

The rapid growth of IoT is dependent on the infrastructure needed to support it. While 5G often takes the spotlight for enabling new IoT use cases, edge computing is already working to solve many of the issues created by the exponential increase in IoTs.

NOV 2, 2022 • 10 min read

Rachel Kempf - Editor-in-Chief
Azion Introduces Its New Federated Authentication Feature

Azion Introduces Its New Federated Authentication Feature

Azion presents our new federated authentication feature, which simplifies multiple tools' login process and brings more security to the user and your company.

NOV 2, 2022 • 4 min read

Juliano Simas - Product Manager
Thiago Silva - Technical Researcher
Azion and Radware Bot Manager: A Combo for Full Protection

Azion and Radware Bot Manager: A Combo for Full Protection

Our main goal is to ensure efficient bot management closest to end users, leveraging the security, performance and resiliency of the Azion platform, combined with a state-of-the-art bot mitigation solution in Radware, fully equipped to detect and block the most aggressive and sophisticated automated attacks.

NOV 1, 2022 • 4 min read

Camila Alves - Technical Researcher
How Will Digital Transformation Change Your Compliance Risk?

How Will Digital Transformation Change Your Compliance Risk?

With many companies’ digital transformation underway, it’s important to consider how new processes and technology can affect your compliance. Find out how!

OCT 24, 2022 • 8 min read

Rachel Kempf - Editor-in-Chief
Can Zero Trust Help You Maintain Compliance?

Can Zero Trust Help You Maintain Compliance?

By replacing perimeter-based security with a zero-trust approach that restricts access based on users and data, teams can strengthen compliance with data privacy laws.

OCT 24, 2022 • 6 min read

Rachel Kempf - Editor-in-Chief
Two-Factor Authentication (2FA) Reinforces the Security of Your Access to the Azion Platform

Two-Factor Authentication (2FA) Reinforces the Security of Your Access to the Azion Platform

Azion has just implemented two-factor authentication (2FA) for Real Time Manager access. Learn how this new feature makes our edge platform even more secure.

JUL 4, 2022 • 5 min read

Juliano Simas - Product Manager
Thiago Silva - Technical Researcher
How Our New Social Login Feature Simplifies the Way You Access the Azion Edge Platform

How Our New Social Login Feature Simplifies the Way You Access the Azion Edge Platform

Azion introduces its new Social Login feature, which makes it easier to register and access Real-Time Manager using the credentials of major social networks.

JUN 21, 2022 • 3 min read

Juliano Simas - Product Manager
Thiago Silva - Technical Researcher
Stay Ahead of the Security Curve with Cyber Threat Intelligence

Stay Ahead of the Security Curve with Cyber Threat Intelligence

Cyber threat intelligence is a proactive security method that collects, analyzes, and organizes threat data to inform fast, effective decision-making. Learn more!

JUN 6, 2022 • 7 min read

Rachel Kempf - Editor-in-Chief
Azion Adopts the Use of Personal Tokens on Its Platform

Azion Adopts the Use of Personal Tokens on Its Platform

Discover our personal tokens, a new way to make your access to Azion APIs and CLI even safer.

MAY 17, 2022 • 7 min read

Juliano Simas - Product Manager
Thiago Silva - Technical Researcher
Azion Achieves Level 1 PCI Certification

Azion Achieves Level 1 PCI Certification

We’re proud to announce that we are now a PCI DSS 3.2.1 Level 1 compliant service provider, effective across all of our edge platform services

APR 12, 2022 • 5 min read

Rachel Kempf - Editor-in-Chief
Azion Achieves SOC 2 Compliance

Azion Achieves SOC 2 Compliance

Azion has achieved SOC 2 Type 2 compliance.

APR 12, 2022 • 1 min read

Rachel Kempf - Editor-in-Chief
How Azion DDoS Protection Mitigates the Main Types of DDoS Attacks

How Azion DDoS Protection Mitigates the Main Types of DDoS Attacks

Over the past two years, the technology industry has faced a progressive increase in the types, size and aggressiveness of DDoS attacks. Therefore, it is necessary to protect yourself to avoid major financial losses and damage to your company's image.

MAR 9, 2022 • 13 min read

Andrew Johnson - Product Marketing Manager
Filipe Trindade - Delivery Manager
Marcelo Avila - Product Manager
Thiago Silva - Technical Researcher
Easily Obtain SSL Certificates with Let's Encrypt

Easily Obtain SSL Certificates with Let's Encrypt

With Let’s Encrypt’s automated process, you can easily obtain SSL certificates for your domains and set them up at no additional cost on Azion’s platform.

JAN 18, 2022 • 8 min read

Andrew Johnson - Product Marketing Manager
Gabriel Nes - Senior Software Engineering Director
Rachel Kempf - Editor-in-Chief
How Much Should You Spend on Cybersecurity?

How Much Should You Spend on Cybersecurity?

Budgeting for cybersecurity requires IT decision makers to analyze their needs, prioritize cost-effective solutions, and consider recent security trends.

JAN 13, 2022 • 9 min read

Andrew Johnson - Product Marketing Manager
Mauricio Pegoraro - CISO
Rachel Kempf - Editor-in-Chief
Benefits of a Modern DNS at the Edge

Benefits of a Modern DNS at the Edge

Find out the benefits of a modern DNS in an edge computing platform. Azion's Intelligent DNS.

JAN 12, 2022 • 8 min read

Giovani Rinaldi - Developer & Systems Specialist
Nick Sandoval - Product Marketing Manager
Vivian Seixas - Technical Researcher
A Closer Look at Log4Shell and Azion’s Protections

A Closer Look at Log4Shell and Azion’s Protections

Given the severity of the Log4Shell exploit, security teams must rely on robust WAFs that not only protect known exploits, but new and emerging variants.

JAN 6, 2022 • 9 min read

Andrew Johnson - Product Marketing Manager
Mauricio Pegoraro - CISO
Rachel Kempf - Editor-in-Chief
How Azion Protects Our Customers from CVE-2021-44228

How Azion Protects Our Customers from CVE-2021-44228

CVE-2021-44228 is a vulnerability in Log4j that enables remote file execution. Azion’s WAF offers protection with a simple rule configuration.

DEC 20, 2021 • 5 min read

Andrew Johnson - Product Marketing Manager
How Cybersecurity Protects Your Brand Image

How Cybersecurity Protects Your Brand Image

Downtime, spam, and data leaks can damage your brand image. Choosing the right security products will help you avoid attacks that protect your brand.

NOV 18, 2021 • 11 min read

Rachel Kempf - Editor-in-Chief
Edge Computing and the Future of Healthcare

Edge Computing and the Future of Healthcare

Edge computing will revolutionize the future of healthcare with localized data security, less dependence on bandwidth, and mission-critical low latency.

NOV 17, 2021 • 12 min read

Rachel Kempf - Editor-in-Chief
The Rising Cost of Cyberattacks

The Rising Cost of Cyberattacks

The cost of cyberattacks to businesses is higher than ever. Investing in cybersecurity now can avoid these damages and improve your users’ trust.

NOV 9, 2021 • 8 min read

Rachel Kempf - Editor-in-Chief
Analytics as a Security Tool

Analytics as a Security Tool

Learn how data analytics can enhance your security by providing internal transparency.

NOV 4, 2021 • 9 min read

Frank Garland - Technical Researcher
A Quick Guide to Securing Serverless Applications

A Quick Guide to Securing Serverless Applications

Serverless developers are responsible for securing their data, third-party services, and code. Best practices like least-privilege access can ensure protection.

OCT 26, 2021 • 9 min read

James Christopher - Product Marketing Manager
Rachel Kempf - Editor-in-Chief
Protecting Against Zero Days: Apache HTTP Server Exploit (CVE-2021-41773)

Protecting Against Zero Days: Apache HTTP Server Exploit (CVE-2021-41773)

A zero-day path traversal attack is being used to exploit a vulnerability in Apache HTTP servers. You can protect against it using an advanced rules-based WAF.

OCT 22, 2021 • 6 min read

Rachel Kempf - Editor-in-Chief
Most Common Types of DDoS Attacks

Most Common Types of DDoS Attacks

To stop DDoS attacks from crashing or degrading your web application, you must understand what they are and how they work.

OCT 13, 2021 • 6 min read

Rachel Kempf - Editor-in-Chief
Secure Your Website for Black Friday

Secure Your Website for Black Friday

Learn how to secure your website and ready yourself for Black Friday.

OCT 5, 2021 • 6 min read

Frank Garland - Technical Researcher
How to Keep Edge Applications Secure

How to Keep Edge Applications Secure

Edge security strategies like zero trust have benefits for applications and websites residing anywhere in today’s complex threat landscape.

SEP 30, 2021 • 9 min read

Rachel Kempf - Editor-in-Chief
Improve Security with Custom Rule Sets

Improve Security with Custom Rule Sets

Protect against massive cyberattacks with Edge Firewall

SEP 24, 2021 • 7 min read

Maria Celeste Casali - Technical Writer
Ransomware: What Is It and How Can You Prevent It?

Ransomware: What Is It and How Can You Prevent It?

As Ransomware attacks increase, learn how Edge Computing can lower your ransomware risk and keep your critical applications and data secure.

AUG 31, 2021 • 10 min read

Andrew Johnson - Product Marketing Manager
DDoS Attack Trends for H2 2021

DDoS Attack Trends for H2 2021

With the continued high risk of DDoS attacks, the most important step a company can take in ensuring its availability and performance is to be prepared for attacks before they begin.

AUG 13, 2021 • 10 min read

Rachel Kempf - Editor-in-Chief
Build Data Insights to Keep you Secure and Compliant with Regulatory Laws

Build Data Insights to Keep you Secure and Compliant with Regulatory Laws

Azion Data Stream: Ensure Safety and Comply with Regulatory Laws.

AUG 4, 2021 • 3 min read

Vivian Seixas - Technical Researcher
Keep Your e-Commerce Available on Black Friday

Keep Your e-Commerce Available on Black Friday

Having an outage on Black Friday is every e-commerce owner’s worst nightmare. Preparing for access spikes and DDoS attacks can ensure that your site stays available.

JUL 27, 2021 • 10 min read

Rachel Kempf - Editor-in-Chief
What is a DDoS attack, anyway?

What is a DDoS attack, anyway?

Distributed Denial of Service (DDoS) attacks are one of the most common forms of cyber attacks we have today.

JUL 1, 2021 • 8 min read

Deborah Happ - Technical Researcher
5 management techniques to mitigate bad bots on your website

5 management techniques to mitigate bad bots on your website

Bad bots represent approximately 26% of internet traffic and disrupt services, steal data, perform fraudulent and other illegal activities.

JUN 4, 2021 • 5 min read

Camila Alves - Technical Researcher
Delivering Speed with Security: Why Azion Is Ideal for Finance Apps

Delivering Speed with Security: Why Azion Is Ideal for Finance Apps

Some of the measures designed to secure applications can negatively impact performance, resulting in a tradeoff that finance apps can’t afford to make. Edge computing can prevent this dilemma.

MAY 5, 2021 • 10 min read

Rachel Kempf - Editor-in-Chief
Three Ways Edge Computing Can Improve e-Commerce

Three Ways Edge Computing Can Improve e-Commerce

As e-commerce becomes an increasingly popular way for consumers to shop, businesses must find new and innovative ways to improve their sites in order to remain competitive. By providing speed, increased availability, real-time analytics, and security in the last mile, edge computing can give retailers a competitive advantage.

APR 20, 2021 • 11 min read

Rachel Kempf - Editor-in-Chief
Bots: Allies or Enemies? How to Ensure the Security of Your Business and Clients

Bots: Allies or Enemies? How to Ensure the Security of Your Business and Clients

Customer data moves back and forth all the time, and although the forms of virtual interaction have diversified, security when protecting this data has not always been enough. Since companies are increasingly building cloud-based applications with SaaS, security must also evolve to keep pace with this modernization.

APR 9, 2021 • 6 min read

Camila Alves - Technical Researcher
DDoS Attack Trends for 2021

DDoS Attack Trends for 2021

Ongoing changes to Internet use like accelerated cloud migration and the increase in IoT devices have resulted in larger and more frequent DDoS attacks, attacks on APIs, and new attack weapons. The most important step a company can take in protecting against DDoS attacks is to be prepared for them before they begin.

MAR 2, 2021 • 10 min read

Rachel Kempf - Editor-in-Chief
Strengthening Routing Security

Strengthening Routing Security

Azion is working with the Internet Society on implementing MANRS, a sweeping initiative to tackle BGP vulnerabilities and routing weaknesses in pursuit of building a safer, more stable global internet.

MAR 2, 2021 • 5 min read

Frank Garland - Technical Researcher
Zero Trust: How Does It Work?

Zero Trust: How Does It Work?

Click here to read about what the zero trust economy is and how it can improve your cybersecurity.

NOV 19, 2020 • 9 min read

Ernie Regalado - Product Marketing Director
Origin Shield, Available for RTM and API

Origin Shield, Available for RTM and API

Automate the configuration of your firewall rules and release or block access at its source only to specific IP addresses.

JUL 13, 2020 • 3 min read

Rodrigo Costa - Product Manager

Subscribe to our Newsletter