What you should know about WAFs
Background Web application firewalls are commonly used to defend web applications (or mobile applications, APIs, etc) against known attacks.
At a basic level, they work by having a large set of rules which defines what bad or malicious requests to the site look like. You would set it up against a …
...Read Article
PCI DSS 4.0 Compliance
Over the last few weeks we have been having a number of conversations with clients about PCI DSS 4.0.1; specifically, where and how we could help them with being more compliant.
Firstly, let’s take a look at what PCI DSS 4.0 is.
The PCI Security Standards Council’s guideline document (Link in the …
...Read Article
Getting into Cybersecurity
We’re regularly getting people reaching out and asking for either jobs or career advice.
So what does it take to get into cybersecurity, and penetration testing in particular?
Caveats: These are the views of Pākiki, other pentesting companies may have different policies or things they value. If you …
...Read Article
3 Tips to Improve your Security Posture
It was our honour to present at TechFest, run by Canterbury Tech, on the 24th of May 2024. This talk was designed as an introduction to improving your business’s cybersecurity posture. It’s aimed at small to medium businesses who are either unsure of where to start, or are rolling out new systems. …
...Read Article
What Is an Intercepting Proxy?
That’s a great question.
An intercepting proxy is commonly used by security professionals in order to understand how an application communicates with a server, and to attempt to find security vulnerabilities by manipulating that traffic. An intercepting proxy is a tool we frequently use in …
...Read Article