Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconSeptember 28, 2016
Clock Icon 4 min Read
Yahoo Data Breach: Can It Affect Your Business?

In this recent massive breach, hackers managed to steal email ids, passwords, birthdates and telephone numbers of half a billion users

Read More...
Calender IconSeptember 20, 2016
Clock Icon 3 min Read
What Are Automated Attacks?

Automated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding

Read More...
Calender IconSeptember 20, 2016
Clock Icon 2 min Read
Availability of BYOL option for TAS in AWS

I am writing this to announce a new deployment model for Total Application Security (TAS) in AWS. As you all will know, Indusface announced its marketplace launch on April 20th.

Read More...
Calender IconAugust 30, 2016
Clock Icon 3 min Read
20 Website Security Stats from 2016

What a year it has been so far. With millions of records stolen and thousands of dollars spent in covering from breaches and downtime, what do we get to

Read More...
Calender IconAugust 16, 2016
Clock Icon 4 min Read
DDoS Attack Protection Online on Websites

When anyone can hire machines with advanced processing powers, how difficult you think it is to launch application level distributed denial-of-services?

Read More...
Calender IconJuly 21, 2016
Clock Icon 4 min Read
Application Layer 7 DDoS Attack Protection

DDoS attack as an operational problem. They try hard to prove that it’s not their fault and completely overlook the emotional aspects that a company

Read More...
Calender IconJuly 12, 2016
Clock Icon 2 min Read
31 Google URLs Vulnerable to Open Redirect

Do you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP educative series and we helped you understand

Read More...
Calender IconJuly 5, 2016
Clock Icon < 1 min Read
Major Cyber Security Numbers – 2016

Sources: Identity Theft Resource Center Data Breach Investigations Report Indusface Research …

Read More...
Calender IconJune 21, 2016
Clock Icon 3 min Read
We Asked 6 Random Cybersecurity Questions

cybersecurity questions to few of our readers and cybersecurity experts. Here are a few of them. Question 1 to Kevin Du, Senior Member at the Institute

Read More...
Calender IconJune 7, 2016
Clock Icon 4 min Read
Ecommerce Website Security Best Practices

ecommerce websites receive anywhere from 200 million to 2 billion visitors in a year. Of course, that is huge when compared to a startup ecommerce website

Read More...
Calender IconMay 31, 2016
Clock Icon 2 min Read
CSV Injection with CVS Export Feature

Banking, ecommerce, and a number of other websites increasingly offer spreadsheet export functionality within their applications to help users download .XLS and .CSV but did you know of the CSV Injection risks?

Read More...
Calender IconMay 24, 2016
Clock Icon 6 min Read
93 Small Business CyberSecurity Guide

How do you secure website from hackers? Look at some of the expert tips and ensure that hackers stay away from you and your customers.

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!