Security

The Experts Speak: Cybersecurity Quotes About Zero-Trust, WAF, Social Engineering, and More
Explore expert insights on cybersecurity, Zero Trust, social engineering, and WAF capabilities at Azion Edge.
FEB 1, 2024 • 7 min read


Remember Zero-Day Attacks Blocked by Azion's WAF
Explore how Azion's Web Application Firewall provides robust defense against zero-day attacks, CVE-2021-41773 coverage, and WAF bypass prevention.
NOV 6, 2023 • 4 min read


Seven Questions You Should Ask Before Choosing a WAF
Explore essential factors for selecting a Web Application Firewall (WAF), including integration, automation, compliance, and zero-day attack prevention.
OCT 27, 2023 • 6 min read


Zero Trust Journey | Phase 4: Implementation
Explore effective Zero Trust architecture implementation strategies with Azion's Edge Computing Platform, featuring network monitoring, application micro-segmentation, modern endpoint security, and robust authentication methods.
AUG 21, 2023 • 8 min read



Zero Trust Journey | Phase 3: Access Control
Explore best practices for Zero Trust architecture focusing on access control and ISO/IEC 27002 compliance. Essential strategies for secure user and application management.
JUL 18, 2023 • 6 min read



Zero Trust Journey | Phase 3: Requirements for Access Control
Explore how ISO/IEC 27002 enhances access control in a Zero Trust security model, addressing compliance, critical analysis, and workplace security.
JUN 29, 2023 • 9 min read



Control Access to Your Platform With Scheduled Blocking Function
Discover how Azion's Scheduled Blocking function enhances application access control. Learn to implement time-based access solutions with edge functions.
JUN 21, 2023 • 9 min read



Protect Your Application From Session Theft With Azion
Protect your applications from cookie tampering attacks with Azion's Signed Cookies solution. Learn how to secure your edge applications now!
JUN 21, 2023 • 10 min read



Azion Announces Solution That Blocks Oversized Requests
Explore the Azion Marketplace for the Limit Payload Size solution to enhance application efficiency and secure data transfers with Edge Functions.
MAY 29, 2023 • 4 min read


Zero Trust Journey | Phase 2: Planning
Explore the crucial phases of the Zero Trust journey, focusing on planning, inventory management, and key security considerations using NIST standards.
MAY 22, 2023 • 7 min read



Zero Trust Journey with Azion | Phase 1: Preparation
Explore the key phases like preparation, strategy, and roadmap crucial for a successful Zero Trust implementation.
APR 24, 2023 • 6 min read



What Is Data Loss Prevention and How Can I Protect My Business?
Explore how DLP and Edge Computing protect data, ensuring compliance and preventing data leaks in organizations.
APR 17, 2023 • 6 min read



First Steps to Simplify the Zero Trust Model Adoption
Explore the essentials of a zero trust security model: identification, solution mapping, and microsegmentation to protect data and networks effectively.
MAR 27, 2023 • 8 min read



Azion's WAF Is Not Vulnerable to the CRLF Injection Bypass
Discover how Azion's Web Application Firewall (WAF) excels in preventing CRLF injection attacks and other cybersecurity threats, safeguarding web applications effectively.
MAR 23, 2023 • 6 min read



Understand Zero Trust Security's Approach to Data Protection
Explore Zero Trust Security for robust data protection. Learn how micro-segmentation and access control prevent data breaches and improve security.
MAR 20, 2023 • 6 min read


Five Cases of IT Transformation with Edge Computing
Discover the transformative power of Edge Computing through success stories from diverse sectors. Explore its impacts on cost reduction, application performance, and user experience.
FEB 15, 2023 • 17 min read


How Justa Has Been Evolving Its Technology to Meet Modern Digital Demands
Explore how Justa enhances payment security and simplifies compliance using Azion's Edge solutions, improving performance and customer experience in Brazil.
JAN 17, 2023 • 4 min read


The recent WAF Bypass attack does not affect Azion's Web Application Firewall
Discover how Azion's Web Application Firewall seamlessly blocks new SQL injection attacks using JSON syntax, ensuring robust cloud security.
DEC 20, 2022 • 5 min read




Azion Achieves SOC 3 Compliance
Explore Azion's SOC 3 compliance, ensuring our edge platform secures web applications and sites with top-tier data security and availability controls.
NOV 14, 2022 • 2 min read


Azion Introduces Its New Federated Authentication Feature
Explore Azion's new federated authentication for secure, simplified single sign-on across all Azion products, enhancing user experience and security.
NOV 2, 2022 • 4 min read



How Azion DDoS Protection Mitigates the Main Types of DDoS Attacks
Explore how Azion DDoS Protection leverages edge computing for advanced DDoS mitigation, ensuring high security with minimal latency and no service degradation.
MAR 9, 2022 • 13 min read





Easily Obtain SSL Certificates with Let's Encrypt
Learn how to obtain and manage SSL certificates effortlessly with Let's Encrypt and Azion's Edge platform using ACME protocol for enhanced security.
JAN 18, 2022 • 8 min read




Ransomware: What Is It and How Can You Prevent It?
Explore how Edge Computing combats ransomware, leveraging serverless applications and zero-trust security to protect your data.
AUG 31, 2021 • 10 min read


Strengthening Routing Security
Explore how Azion partners with MANRS by the Internet Society to enhance global internet security and BGP protocol stability.
MAR 2, 2021 • 5 min read

Subscribe to our Newsletter
Get the latest product updates, event highlights, and tech industry insights delivered to your inbox.