Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconJanuary 31, 2017
Clock Icon 2 min Read
5 Most Shared Application Security Posts in 2016

As more and more companies prepare for cloud and digital domains, there is growing ambiguity on application security. Read about the top appsec threats.

Read More...
Calender IconJanuary 5, 2017
Clock Icon 3 min Read
Security Lessons Learned in 2016

More than 2.2 billion records were stolen last year in almost 3,000 public data breaches. While the media spotlight was on big brand mishaps like that

Read More...
Calender IconDecember 13, 2016
Clock Icon 3 min Read
How to Protect Website from Hackers?

Wouldn’t it be great if you fix security holes the same day they are found? But, we all know how that plan goes. Loaded task lists, marketing priorities

Read More...
Calender IconNovember 22, 2016
Clock Icon 3 min Read
How Secure Are Your Apps in Cloud?

Today, cloud is an intrinsic part of business strategies focusing on product availability, maintaining uptime, scaling rapidly, and reducing infrastructure

Read More...
Calender IconNovember 10, 2016
Clock Icon 4 min Read
How to Secure WordPress Website from Hackers?

Today, 21 million websites use the top 20 Content Management Systems (CMS) with access to more than 67 thousand free plugins. WordPress is by far

Read More...
Calender IconNovember 10, 2016
Clock Icon 2 min Read
DLL Hijacking and How It Is Done?

Windows application comprises of various folders and files. These files includes executables, dll and various other formats. A dll is loaded dynamically

Read More...
Calender IconOctober 20, 2016
Clock Icon 3 min Read
Application Security for Startups and SMEs

Despite all the media attention on large enterprise data breaches such as Yahoo and TalkTalk, small and medium sized enterprises (SME) don’t feel that they

Read More...
Calender IconSeptember 28, 2016
Clock Icon 4 min Read
Yahoo Data Breach: Can It Affect Your Business?

In this recent massive breach, hackers managed to steal email ids, passwords, birthdates and telephone numbers of half a billion users

Read More...
Calender IconSeptember 20, 2016
Clock Icon 3 min Read
What Are Automated Attacks?

Automated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding

Read More...
Calender IconSeptember 20, 2016
Clock Icon 2 min Read
Availability of BYOL option for TAS in AWS

I am writing this to announce a new deployment model for Total Application Security (TAS) in AWS. As you all will know, Indusface announced its marketplace launch on April 20th.

Read More...
Calender IconAugust 30, 2016
Clock Icon 3 min Read
20 Website Security Stats from 2016

What a year it has been so far. With millions of records stolen and thousands of dollars spent in covering from breaches and downtime, what do we get to

Read More...
Calender IconAugust 16, 2016
Clock Icon 4 min Read
DDoS Attack Protection Online on Websites

When anyone can hire machines with advanced processing powers, how difficult you think it is to launch application level distributed denial-of-services?

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!