1 of 20
2 of 20
3 of 20
4 of 20
5 of 20
6 of 20
7 of 20
8 of 20
9 of 20
10 of 20
11 of 20
12 of 20
13 of 20
14 of 20
15 of 20
16 of 20
17 of 20
18 of 20
19 of 20
20 of 20

site

doc

blog

success stories

Blog

Zero Trust Journey with Azion | Phase 1: Preparation

Zero Trust Journey with Azion | Phase 1: Preparation

April 24, 2023

In the debut post of our series on how to simplify the adoption of a Zero Trust security model, we presented the planning steps needed before the implementation begins. One of the most complex steps listed in that article is the Zero Trust journey, which consists of four phases (preparation, planning, access control, and implementation) and encompasses several processes. Similarly to the other parts of this process, the Zero Trust journey can be simplified at many points, starting with the preparation phase, which will be covered in this blog post.

DNSSEC on the Azion Edge Computing Platform

DNSSEC on the Azion Edge Computing Platform

January 19, 2023

In a previous article, we discussed the importance of the Domain Name System (DNS), a hierarchical structure that works like a "phone book" for the Internet, and DNSSEC, a set of security extensions for the original DNS specification designed to make it harder for criminals to execute cyberattacks. In this article, we will talk about how DNSSEC works on Azion's Edge Computing Platform and how you can enable it to add an extra layer of protection for your websites and applications.

Can Zero Trust Help You Maintain Compliance?

Can Zero Trust Help You Maintain Compliance?

July 6, 2022

Zero trust is increasingly promoted as a must-have for modern security, but is it really a top priority for security teams adapting to new compliance requirements and data protection laws? In the midst of increased data privacy regulations, a larger and more complex attack surface, and rising attacks, adopting a new security framework may seem like an overwhelming task. But in addition to strengthening security, zero trust can actually ease many of the complications that security teams are facing by providing a scalable approach that is well-suited to complex modern applications and a patchwork of geographically specific data privacy laws.

How Will Digital Transformation Change Your Compliance Risk?

How Will Digital Transformation Change Your Compliance Risk?

June 30, 2022

Over the past years, businesses around the world have rapidly accelerated their digital transformation – but have their approaches to compliance kept pace with the changes? Companies that do not keep compliance top of mind as part of their digital transformation strategy risk financial and reputational damages that can reduce or even outweigh the benefits of modernization. And with a rise in data privacy regulations and more conscientious consumers, the costs of non-compliance are even greater.

Stay Ahead of the Security Curve with Cyber Threat Intelligence

Stay Ahead of the Security Curve with Cyber Threat Intelligence

June 6, 2022

If you feel like cybersecurity today has become more challenging than ever, you’re right. Alarming trends in DDoS and ransomware, the need to modernize security to accommodate remote work and other trends, an ever-increasing number of hard-to-detect bad bots, and a shortage of skilled security personnel have left many teams scrambling to respond to cyber attacks. Fortunately, building a strong cyber threat intelligence program can help teams not only mitigate the fallout from attacks, but plan targeted, proactive strategies to get ahead of attackers and make the most of their team’s capabilities.

Azion Achieves Level 1 PCI Certification

Azion Achieves Level 1 PCI Certification

April 12, 2022

Meeting PCI compliance regulations gives your customers the assurance that you take their privacy and security seriously. Unfortunately, the same regulations that ensure your customers’ data security can add latency to your site. At Azion, we believe that security shouldn’t come at the cost of performance. That’s why we’re proud to announce that we are now a PCI DSS 3.2.1 Level 1 compliant service provider, effective across all of our edge platform services--delivering the security your business requires with the performance you’ve come to expect.

Easily Obtain SSL Certificates with Let's Encrypt

Easily Obtain SSL Certificates with Let's Encrypt

January 18, 2022

Let’s Encrypt is a free, open, and automated Certificate Authority (CA) used to issue SSL certificates using the ACME (Automatic Certificate Management Environment) protocol. SSL certificates are a crucial component for the security and success of a website, as they enable secure data transfer using HTTPS. Not only does HTTPS increase a site’s search engine positioning and users’ trust, it enables use of the HTTP/2 protocol, resulting in significant performance improvements over HTTP/1.

How Much Should You Spend on Cybersecurity?

How Much Should You Spend on Cybersecurity?

January 6, 2022

With the costs of a cyberattack skyrocketing, it’s crucial that businesses make security a priority when planning their spending this year. But how much is enough, especially for businesses facing tight budget constraints? Understanding and prioritizing cybersecurity costs is crucial for IT decision makers to not only understand how much to spend, but ensure that their investment in security pays off. This blog post will help guide security spending decisions by reviewing how much companies spend on cybersecurity on average, which factors can drive up spending, and how to control security costs without compromising your security effectiveness.

How Azion Protects Our Customers from CVE-2021-44228

How Azion Protects Our Customers from CVE-2021-44228

December 20, 2021

A zero-day exploit has been recently discovered in multiple versions of the Apache Log4j library that allows for unauthenticated remote code execution by logging a certain string. The vulnerability, which was published as CVE-2021-44228 on Friday, December 10, poses a severe risk due to the ubiquity of the popular Java-based logging library, how easy it is to exploit, and the impact of the attack, which gives unauthorized users full server control. To ensure that our customers are protected against this critical vulnerability, we’d like to share what we’ve done to guard against these attacks and what steps Azion users should take to ensure they are protected.

How Cybersecurity Protects Your Brand Image

How Cybersecurity Protects Your Brand Image

November 18, 2021

Whether it is data privacy and security issues, environmental concerns, or supporting equal rights, today’s users are more concerned than ever with using brands that share their values and prioritize ethical practices. As a result, having a positive brand image is key to a successful business. However, all the work you put into building a strong brand reputation can be destroyed by cyberattacks that threaten your availability, deface your site with spam, or leak sensitive customer data.

A Quick Guide to Securing Serverless Applications

A Quick Guide to Securing Serverless Applications

October 26, 2021

Since its inception, the serverless model has revolutionized computing--but how has it changed security? Serverless computing platforms enable developers to build and run applications that are managed by the serverless provider, with automatic scaling and resources charged on a per-use basis. This means that the underlying infrastructure is not only provisioned and managed, but secured by the serverless provider, so developers don’t need to worry about some of the greatest security risks, such as known vulnerabilities in unpatched servers.

Protecting Against Zero Days: Apache HTTP Server Exploit (CVE-2021-41773)

Protecting Against Zero Days: Apache HTTP Server Exploit (CVE-2021-41773)

October 22, 2021

On September 29, 2021, Apache’s security team learned of a zero-day vulnerability (CVE 2021-41773) that attackers were exploiting to compromise Apache HTTP web servers and access sensitive files. They recommend that anyone using Apache servers 2.4.49 or 2.4.50 Linux and Windows-based servers to update to the latest version, 2.4.51, using the instructions found on the official Apache HTTP Server project site.

Secure Your Website for Black Friday

Secure Your Website for Black Friday

September 28, 2021

Your company’s ecomm experience relies on its security infrastructure to safeguard against attacks seeking to crash servers or expose sensitive client information, and on Black Friday those attacks are only going to multiply. Taking advantage of the intense traffic strain so many enterprises will face, sophisticated bots and bad actors use common attacks like DDoS to flood your system with junk connection requests until your overloaded servers are no longer able to keep up. In order to prevent that, you need to invest in a state of the art web application firewall to block attacks.

Keep Your e-Commerce Available on Black Friday

Keep Your e-Commerce Available on Black Friday

July 27, 2021

Having a site or application outage on Black Friday is every e-commerce owner’s worst nightmare. E-commerce is notorious for it’s razor-thin profit margins, making these major holiday shopping days not only important, but critical to the success of retailers’ apps and websites. On average, online stores generate 300% more during the holiday weekend than other weekends in November, and according to Adobe Analytics, spend in 2021 reached 12 million per minute during the day’s peak hour. And while these gains are a boon to most retailers, those that aren’t prepared for the extra traffic stand will suffer a huge loss in profits.

Three Ways Edge Computing Can Improve e-Commerce

Three Ways Edge Computing Can Improve e-Commerce

April 20, 2021

As e-commerce becomes an increasingly popular way for consumers to shop, businesses must find new and innovative ways to improve their sites in order to remain competitive. By providing speed, increased availability, real-time analytics, and security in the last mile, edge computing can give retailers a competitive advantage. This blog post will examine the benefits of edge computing and how it can be used to deliver three key needs for e-commerce businesses: high performance, custom experiences, and building trust with customers.

Signature-Based vs. Scoring-Based WAF

Signature-Based vs. Scoring-Based WAF

March 6, 2021

Web Application Firewalls, or WAFs, are a key component of modern web security. According to Verizon’s 2020 Data Breach Incident Report, over 80% of attacks last year targeted web applications--an unsurprising statistic given the ever-increasing size of modern applications’ attack surface. However, not all WAFs are created equal. As both cyber attacks and web applications become more and more complex, WAFs must use increasingly sophisticated techniques to secure applications--and to ensure that protection does not come at the expense of performance.