ファイルアップロードセキュリティ

Avoid Blind Spots in Your Web Application Security Stack

November 08, 2021 by Thao Duong
In our recent webinar, we gathered some of our OPSWAT experts to share the latest trends in web application security and protecting organizations from file-borne malware. The speakers discussed the key concerns about web applications and...

Cybersecurity Awareness Month 2021 and Protecting Critical Infrastructure

October 27, 2021
“Cyber threats can affect every American, every business regardless of size, and every community.” - Statement by President Joe Biden on Cybersecurity Awareness Month

Don’t Trust What You See

October 18, 2021 by Vinh Lam, Senior Software Architect
“Appearances can be deceptive,” the adage goes. The same notion applies to digital content, where people with malicious intent can trick our eyes into believing what they want us to see online. To illustrate this case, while our team was...

OPSWAT to Add Three New Avira Technologies to OPSWAT MetaDefender Cloud

September 21, 2021
OPSWAT and Avira have announced that they will expand their partnership to incorporate three Avira technologies into OPSWAT MetaDefender Cloud: the Avira anti-malware engine, File Reputation and Web Reputation services. These technologies...

インフォグラフィック:Webアプリケーションセキュリティの盲点

September 16, 2021 by Thao Duong
多くの組織は、ファイルのアップロードや書類の提出、また、コンテンツの共有や協業のために Web アプリケーションを導入しています。アップロードされたファイルは、組織の生産性向上や、顧客の使いやすさを向上しますが、一方で、組織にとって新しいサイバー攻撃のベクトルになります。

Beyond the Web Application Firewall (WAF): Common Myths about Web Application Security

September 02, 2021 by Nav Gill
For most organizations, web application security begins with solutions designed to address the Open Web Application Security Protect (OWASP) Top Ten Web Application Security Risks[1]. These risks include the most common web application...

Evolution of Infrastructure: From Data Centers to Containers

July 12, 2021 by Thao Duong
The impact of the digital transformation revolution requires organizations to look for more efficient solutions to manage, collect and share information while mitigating data risks and ensuring sensible resource allocation. By the same...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.