Why Implementing App Security Can Lead To Spiraling Costs
To avoid overspending, businesses should reevaluate their security vendors and prioritize a more cost-effective approach.
To avoid overspending, businesses should reevaluate their security vendors and prioritize a more cost-effective approach.
CVE-2023-44487 found in the HTTP/2 protocol could allow a DoS attack against web servers, reverse proxies, or other software. HAProxy products are unaffected, but we're monitoring the situation.
HAProxy Technologies released new versions of its products to fix the vulnerability CVE-2023-40225. Learn more here.
HAProxy Technologies showcased its deep, targeted, and scalable security at Black Hat USA 2023.
The G2 Summer 2023 Grid Reports recognize HAProxy as a leader in the Web Application Firewall (WAF) and DDoS Protection categories. These rankings are based on customer satisfaction and market presenc
Improvements in acme.sh integration allows you to manage TLS certificates with Let’s Encrypt without restarting HAProxy.
HAProxy Technologies has announced that HAProxy 2.0 or newer, HAProxy Enterprise 2.0 or newer, and HAProxy ALOHA 12.5 or newer are affected by CVE-2023-25725. If you are using an affected product you
This blog post will discuss web threats and how to protect yourself against DDoS attacks, web scraping, brute-force attacks, and vulnerability scanning.
Cookies have many usages, most notably user authentication and settings. This post will explain the best practices for how to secure your cookies.
In this blog post, you will learn that application acceleration is all about improving the responsiveness of a digital service.
Learn how to secure your APIs against unauthorized access. The OAuth 2 protocol uses JSON Web Tokens to convey a client’s permissions and HAProxy can verify whether a token can be trusted.
HAProxy enables mTLS, supporting client certificate authentication for both clients and backend servers. Learn how to set it up in this blog post.