Entries by Esther Jeohn

Love in All the Wrong Places: the Dangers of Online Dating

As February 14th creeps closer, hype over finding a valentine is at its peak. But finding a significant other does pose more difficulty in this day and age with the rise of career-driven individuals, slaving away with the chaotic schedules of everyday life. Furthermore, with the digital world just an arm’s length away, it’s not […]

Online Safety Tips from Penta Security, 2017 Data Privacy Day Champion

A Data Privacy Day Champion this year, Penta Security believes that organizations, businesses and governments are collectively responsible for being conscientious stewards of personal information. For Penta Security, this year marks two decades of experience in protecting an asset valued by all: personal data. Data Privacy Day, held annually on January 28, is a worldwide […]

WAPPLES Web Application Firewall Interoperability for HPE Security ArcSight

Integration allows customers to increase effective security operations for quicker detection and response Penta Security Systems Inc., a leading Web and Data security provider in the Asian-Pacific region, announced its partnership with HPE through the HPE Security Technology Alliance Partners (TAP) Program. The partnership allows for customers to integrate the HPE ArcSight solution with Penta Security’s web […]

PCI DSS and the Road to Compliance

When you’re in the world of cyber security and researching new products, there’s no doubt that you’ll run into a plethora of acronyms. With the large amounts of advanced technology and the technical terms there are, it’s easier to shorten them to save some time and space. However, sometimes all the terminology begins to run […]

The Benefits of Using Signature-less Detection Technology

Cloudbric takes pride in being different from its competitors. With over 19 years of information security experience, Cloudbric Business Edition (BE) utilizes a Web Application Firewall (WAF) based on Penta Security’s unique logic based hardware WAF called WAPPLES. Managing your enterprise’s security has never been easier, not to mention cost saving. Cloudbric BE is a […]

What Does ‘Website’ Mean to CMS Users?

The definition and concept of website will invariably differ depending on the demographic you’re questioning. Defined literally, a website is a connected group of pages on the internet that use unique addresses and routes on the network, which are based on internet protocols. But who can actually understand this kind of explanation? CMS has become the leading solution […]

Can I Also Protect My Subdomains With Cloudbric?

Cloudbric received a lot of questions about our web application security service, and in our mission to democratize cyber security, we try our best to make the information readily available. We post a lot of answers in our Help Center, but every week we will give a longer answer about one question. This week, a […]

Using a Cloud-Based WAF as a Service for Better Web Security

Before the advent of the cloud-based WAF, Web Application Firewalls (WAF) usually came in the form of hardware. These WAF appliances were great for big businesses and enterprises. They provided flexibility, fast accessibility to the device and  did not depend on external connections for functionality. However, they also had a few disadvantages. Hardware WAFs were […]