Information Security Leader, Author, Instructor and Speaker

Building application firewall rulebases

Posted on April 24, 2007 in Articles | by

During the past decade, most enterprises have made significant investments in network and perimeter security. Organizations have tightened their controls and moved toward a defense posture that dramatically limits the effectiveness of hackers’ network-scanning attacks. Unfortunately, while security professionals were busy building up network controls, attackers spent their time developing new techniques to strike at the next Achilles’ heel: the application layer.

Read the full article: Building application firewall rulebases

Published in SearchSecurity on 04/24/07

TAGS: ,

Leave a Reply

Your email address will not be published. Required fields are marked *