article thumbnail

Top Web Application Firewall (WAF) Vendors

eSecurity Planet

From behavioral analytics and machine learning to in-browser data encryption and an anti-bot mobile SDK, F5 offers industry-leading features. A staple in the cybersecurity industry since 2000, Fortinet is known for its line of firewalls, including the FortiWeb web application firewall. Read our in-depth review of F5 Advanced WAF.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. Again, all all around the InfoSec community.

Hacking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

He also talks about the future generation of hacking, what motivates young people today to think outside the box in a world where infosec is increasingly becoming vocational and expected. Vamosi: There’s also a list of words commonly used in infosec that are being challenged. Vamosi: Hackers. Yes, we show you know this.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Whether it’s designing or just playing CTFs, John Hammond knows a lot about the gamification of infosec. In the moment you’ll meet someone who’s been gamifying infosec for years. Included with that question was an encrypted text file which John downloaded then wrote a simple python script to decrypt it.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Whether it’s designing or just playing CTFs, John Hammond knows a lot about the gamification of infosec. In the moment you’ll meet someone who’s been gamifying infosec for years. Included with that question was an encrypted text file which John downloaded then wrote a simple python script to decrypt it.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like network encryption, certificate pinning - is this device domain joined or not? These might begin to solve problems with individual voting machines, but what about the larger problem? There's lots of different things.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like network encryption, certificate pinning - is this device domain joined or not? These might begin to solve problems with individual voting machines, but what about the larger problem? There's lots of different things.

Hacking 52