1 of 20
2 of 20
3 of 20
4 of 20
5 of 20
6 of 20
7 of 20
8 of 20
9 of 20
10 of 20
11 of 20
12 of 20
13 of 20
14 of 20
15 of 20
16 of 20
17 of 20
18 of 20
19 of 20
20 of 20

site

doc

blog

success stories

Blog

Stay Ahead of the Security Curve with Cyber Threat Intelligence

Stay Ahead of the Security Curve with Cyber Threat Intelligence

June 6, 2022

If you feel like cybersecurity today has become more challenging than ever, you’re right. Alarming trends in DDoS and ransomware, the need to modernize security to accommodate remote work and other trends, an ever-increasing number of hard-to-detect bad bots, and a shortage of skilled security personnel have left many teams scrambling to respond to cyber attacks. Fortunately, building a strong cyber threat intelligence program can help teams not only mitigate the fallout from attacks, but plan targeted, proactive strategies to get ahead of attackers and make the most of their team’s capabilities.

Azion Achieves Level 1 PCI Certification

Azion Achieves Level 1 PCI Certification

April 12, 2022

Meeting PCI compliance regulations gives your customers the assurance that you take their privacy and security seriously. Unfortunately, the same regulations that ensure your customers’ data security can add latency to your site. At Azion, we believe that security shouldn’t come at the cost of performance. That’s why we’re proud to announce that we are now a PCI DSS 3.2.1 Level 1 compliant service provider, effective across all of our edge platform services--delivering the security your business requires with the performance you’ve come to expect.

Easily Obtain SSL Certificates with Let's Encrypt

Easily Obtain SSL Certificates with Let's Encrypt

January 18, 2022

Let’s Encrypt is a free, open, and automated Certificate Authority (CA) used to issue SSL certificates using the ACME (Automatic Certificate Management Environment) protocol. SSL certificates are a crucial component for the security and success of a website, as they enable secure data transfer using HTTPS. Not only does HTTPS increase a site’s search engine positioning and users’ trust, it enables use of the HTTP/2 protocol, resulting in significant performance improvements over HTTP/1.

How Much Should You Spend on Cybersecurity?

How Much Should You Spend on Cybersecurity?

January 6, 2022

With the costs of a cyberattack skyrocketing, it’s crucial that businesses make security a priority when planning their spending this year. But how much is enough, especially for businesses facing tight budget constraints? Understanding and prioritizing cybersecurity costs is crucial for IT decision makers to not only understand how much to spend, but ensure that their investment in security pays off. This blog post will help guide security spending decisions by reviewing how much companies spend on cybersecurity on average, which factors can drive up spending, and how to control security costs without compromising your security effectiveness.

How Azion Protects Our Customers from CVE-2021-44228

How Azion Protects Our Customers from CVE-2021-44228

December 20, 2021

A zero-day exploit has been recently discovered in multiple versions of the Apache Log4j library that allows for unauthenticated remote code execution by logging a certain string. The vulnerability, which was published as CVE-2021-44228 on Friday, December 10, poses a severe risk due to the ubiquity of the popular Java-based logging library, how easy it is to exploit, and the impact of the attack, which gives unauthorized users full server control. To ensure that our customers are protected against this critical vulnerability, we’d like to share what we’ve done to guard against these attacks and what steps Azion users should take to ensure they are protected.

How Cybersecurity Protects Your Brand Image

How Cybersecurity Protects Your Brand Image

November 18, 2021

Whether it is data privacy and security issues, environmental concerns, or supporting equal rights, today’s users are more concerned than ever with using brands that share their values and prioritize ethical practices. As a result, having a positive brand image is key to a successful business. However, all the work you put into building a strong brand reputation can be destroyed by cyberattacks that threaten your availability, deface your site with spam, or leak sensitive customer data.

A Quick Guide to Securing Serverless Applications

A Quick Guide to Securing Serverless Applications

October 26, 2021

Since its inception, the serverless model has revolutionized computing--but how has it changed security? Serverless computing platforms enable developers to build and run applications that are managed by the serverless provider, with automatic scaling and resources charged on a per-use basis. This means that the underlying infrastructure is not only provisioned and managed, but secured by the serverless provider, so developers don’t need to worry about some of the greatest security risks, such as known vulnerabilities in unpatched servers.

Protecting Against Zero Days: Apache HTTP Server Exploit (CVE-2021-41773)

Protecting Against Zero Days: Apache HTTP Server Exploit (CVE-2021-41773)

October 22, 2021

On September 29, 2021, Apache’s security team learned of a zero-day vulnerability (CVE 2021-41773) that attackers were exploiting to compromise Apache HTTP web servers and access sensitive files. They recommend that anyone using Apache servers 2.4.49 or 2.4.50 Linux and Windows-based servers to update to the latest version, 2.4.51, using the instructions found on the official Apache HTTP Server project site.

Secure Your Website for Black Friday

Secure Your Website for Black Friday

September 28, 2021

Your company’s ecomm experience relies on its security infrastructure to safeguard against attacks seeking to crash servers or expose sensitive client information, and on Black Friday those attacks are only going to multiply. Taking advantage of the intense traffic strain so many enterprises will face, sophisticated bots and bad actors use common attacks like DDoS to flood your system with junk connection requests until your overloaded servers are no longer able to keep up. In order to prevent that, you need to invest in a state of the art web application firewall to block attacks.

Keep Your e-Commerce Available on Black Friday 2021

Keep Your e-Commerce Available on Black Friday 2021

July 27, 2021

Having a site or application outage on Black Friday is every e-commerce owner’s worst nightmare. E-commerce is notorious for it’s razor-thin profit margins, making these major holiday shopping days not only important, but critical to the success of retailers’ apps and websites. Due to the pandemic, many shoppers opted to avoid crowded stores and order online last year, using curbside pickup or delivery to minimize contact while receiving their purchases. As many shoppers continue to adjust their shopping patterns pre- and post- pandemic, and others make permanent changes to their routines, e-commerce stores must ensure their sites are prepared to handle huge traffic spikes this holiday season.

Three Ways Edge Computing Can Improve e-Commerce

Three Ways Edge Computing Can Improve e-Commerce

April 20, 2021

As e-commerce becomes an increasingly popular way for consumers to shop, businesses must find new and innovative ways to improve their sites in order to remain competitive. By providing speed, increased availability, real-time analytics, and security in the last mile, edge computing can give retailers a competitive advantage. This blog post will examine the benefits of edge computing and how it can be used to deliver three key needs for e-commerce businesses: high performance, custom experiences, and building trust with customers.

Signature-Based vs. Scoring-Based WAF

Signature-Based vs. Scoring-Based WAF

March 5, 2021

Web Application Firewalls, or WAFs, are a key component of modern web security. According to Verizon’s 2020 Data Breach Incident Report, over 80% of attacks last year targeted web applications--an unsurprising statistic given the ever-increasing size of modern applications’ attack surface. However, not all WAFs are created equal. As both cyber attacks and web applications become more and more complex, WAFs must use increasingly sophisticated techniques to secure applications--and to ensure that protection does not come at the expense of performance.