Web Application Firewall (WAF)
It’s a Firewall that operates at the Application Layer (Layer 7 OSI) that’s designed to monitor, filter and block HTTP/HTTPS traffic to and from a Web Application.
This type of firewall can be deployed in two different methods:
Proxy Mode: It directly receives...
This is the process of gathering, analysing, and utilizing information about potential or current threats to an organization’s digital assets focusing on understanding the threat landscape identifying threat actors, and anticipating future attacks.
It has several use cases as it can help in threat detection...
Access controls are mechanisms that manage how resources are accessed and by whom. Here are some common types of access controls:
Role-Based Access Control (RBAC)
Permissions are assigned to specific roles rather than to individuals. Users are then assigned to these roles.
E.g. In a company, there...