Knowledge base

RedShield's knowledge base provides insights on the latest trends in web application security, highlights useful product features, and shares thought leadership content on web application shielding. Take a look at our knowledge base!

Knowledge base

Comparing the RedShield-AWS DDoS Solution to Market Alternatives

With the prolific growth in cybercrime, the number of infected devices under the control of criminal...

Knowledge base

RedShield's Response to the WAF Bypass techniques disclosed by Claroty

Knowledge base

Best practices for web authentication

The Verizon Data Breach Report of 2020 provides a comprehensive analysis of the source of many high-...

Knowledge base

What are Cross Site Request Forgery (CSRF, XSRF) Attacks? And how can you effectively mitigate them?

A CSRF attack forces a logged-on victim's browser to send a request to a vulnerable web application,...

Knowledge base

What are Dictionary Attacks? And how can you effectively mitigate them?

Cybercriminals generate permutations of words or character sets, repeated passwords, or variations -...

Knowledge base

RedShield has developed shields to mitigate “Log4j” (CVE-2021-44228)

A zero-day exploit of Apache Log4j 2 (“Log4Shell”, CVE-2021-44228) was disclosed on 9 December 2021....

Knowledge base

TLSv1.0 and v1.1 are being deprecated: Here’s how to upgrade, while keeping your customers connected

And if you’re not ready for it (and more than 40% of the top million sites still support 1.0 and 1.1...

Knowledge base

How can you protect your web applications (and business) from carding attacks?

Australia Post’s Inside Australian Online Shopping 2021 report highlights a 26.9% YOY growth in onli...

Knowledge base

Introducing Second-Factor Authentication (2FA) Shields

Today, we are excited to announce a brand new function that RedShield has developed to address a spe...

Knowledge base

Risk, resourcing, and legacy applications: Application security challenges for state and local government

Faced with thousands of applications in complex environments to manage, a global skill-shortage of a...

Knowledge base

A Guide to a Best Practice Web Application Operational Security Program

With new application vulnerabilities being published at over 50 a day, the race starts again tomorro...

Knowledge base

Six Misconceptions About Shielding

Misconception #1: Fixing code is always better, more robust, or more secure When vulnerabilities are...

Knowledge base

2021 TAG Cyber Annual: An interview with Andy Prow, CEO & Co-Founder, RedShield

Today, applications are arguably the most important entity to keep up and running on an organization...

Knowledge base

Enabling Secure Digital Transformation: Strategies to Secure Your Project, Customers, and Organization

However, the vast number of ‘moving parts’ in a DX initiative presents new levels of complexity. And...

Knowledge base

Shielding Apps

As one might expect, shielding is a good metaphor for much of what we do in cyber security. Any time...

Knowledge base

Urgent Action Needed to Protect E-Commerce Sites From E-Skimming Attacks Targeting Magento Vulnerabilities

With the sustained Magecart attacks targeting Magento CMS, and the outdated version no longer provid...