Ericom ZTEdge Named "Outperformer" on GigaOM Radar – Click Here! Learn How Web Application Isolation Secures 3rd Party/Unmanaged Devices – Click Here! Ericom Software and ZTEdge Win 5 Global InfoSec Awards – Click Here!

ZTEdge Blog

The ZTEdge team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.

Reducing Compliance Risk with WAI

Regulated industries like healthcare and financial services are facing an increasingly complex regulatory environment.

Read More

Addressing the OWASP Top 10 Application Security Risks with Web Application Isolation: #10 Server Side Request Forgery

Dr. Chase Cunningham demos how cybercriminals scan for open ports, a step typically used for reconnaissance to plan an attack and find vulnerable targets.

Read More

Addressing the OWASP Top 10 Application Security Risks with Web Application Isolation: #4 Insecure Design

Dr. Chase Cunningham manipulates the source code to change session storage values and the token the fictional Juice Shop uses, then demos the WAI security solution.

Read More

Addressing the OWASP Top 10 Application Security Risks with Web Application Isolation: #2 Cryptographic Storage and #8 Software and Data Integrity Failures

Dr. Chase Cunningham discusses how to quickly and easily address the security and compliance associated with a missed or bad SSL certificate.

Read More

Addressing the OWASP Top 10 Application Security Risks with Web Application Isolation: #3 Injection

Injection attacks is #3 in the OWASP 2021 Top 10. Dr. Chase Cunningham illustrates how SQL injection is used by threat actors to gain admin access to applications.

Read More

Addressing the OWASP Top 10 Application Security Risks with Web Application Isolation: #1 Broken Access Control

In this short demo, the first of a series in which he attacks his own Juice Shop in various ways, Dr. Chase Cunningham presents a scenario for “Broken Access Control “ – #1 in OWASP’s 2021 list.

Read More

ZTEdge Identified as an “Outperformer” in GigaOM’s Secure Service Access Solution Radar

GigaOM rates Ericom ZTEdge as a highly innovative platform player that is a market “outperformer”, along with enterprise solutions that cost twice as much.

Read More

Data Security Compliance in the Age of “Work from Anywhere, on Any Device”

Cyber breaches and data leaks, many of which have been traced to outsourced and remote users, working on unmanaged personal devices. How can organizations better manage these risks?

Read More

Criminals Pull Ahead in Phishing Cat-and-Mouse Game

2022 is shaping up to be another banner year for phishing attacks with new tactics for convincing users to click, and new ways to avoid being caught.

Read More