Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconMay 17, 2016
Clock Icon 5 min Read
My DDoS Story

What is a DDoS? How to stop it? Learn what happened at Fishery of Randomland and how Frank survived a distributed denial of service attack on his website.

Read More...
Calender IconMay 4, 2016
Clock Icon 3 min Read
The End of Application Security As You Know It

The current ‘automating everything’ approach for application security shouldn’t be just replaced. It should be buried down under for greater good.

Read More...
Calender IconApril 26, 2016
Clock Icon 4 min Read
What Your Web App Security Had Been Missing?

With rising number of security lapses, the question is inevitable. While many companies understand the importance and need of proper web application security infrastructure, they do not know where to look for it.

Read More...
Calender IconApril 14, 2016
Clock Icon 2 min Read
‘Badlock’ Bug: Everything You Need to Know

Badlock is referenced for Microsoft Windows by CVE-2016-0128 / MS16-047 (Windows SAM and LSAD Downgrade Vulnerability) and for Samba by CVE-2016-2118 (SAMR and LSA man in the middle attacks possible).

Read More...
Calender IconApril 7, 2016
Clock Icon 4 min Read
Why Should Startups Endure Continuous Data Breaches?

In 1996, nine years after the launch of the World Wide Web Project, number of websites had grown to two hundred thousand with a growth of almost 1000% from the last year. People started thinking of getting their business online.

Read More...
Calender IconMarch 31, 2016
Clock Icon 4 min Read
Take the Application Security Quiz

Do you know about the recent bank cyber heist attempt in Bangladesh? Apparently, hackers tried to steal $951 million from country’s account at the Federal Reserve Bank of New York. Although they were not able to get through with all the transactions, $81 million were still transferred in the Philippines.

Read More...
Calender IconMarch 22, 2016
Clock Icon 3 min Read
All You Need To Know About DROWN Attack

DROWN allows hackers to decrypt browser-server communication in hours to attack servers or/and users. Shockingly, this newly found vulnerability

Read More...
Calender IconFebruary 25, 2016
Clock Icon 4 min Read
35 Security Stats Businesses Should Not Miss

Did you know that 155 .GOV and .NIC domains were hacked last year? Learn about more of such facts and figures from the security domain with Indusface.

Read More...
Calender IconFebruary 4, 2016
Clock Icon 3 min Read
7 Trending Indusface Research Articles

It’s easy to lose track of things when so much information is being shared. Indusface brings you the most shared and viewed application security articles.

Read More...
Calender IconJanuary 27, 2016
Clock Icon 4 min Read
Cybersecurity Startup Award Best Product Company

Somewhere in October, NASSCOM-DSCI closed nominations for the Excellence Award. From there, read Indusface’s journey to Emerging IS Product Company.

Read More...
Calender IconJanuary 12, 2016
Clock Icon 4 min Read
Web Application Security Trends

We bring you the top application security trends from across the world to keep the business secure.

Read More...
Calender IconJanuary 6, 2016
Clock Icon 3 min Read
Top Web Application Security Trends

So farewell then, to 2014. This year has been a tremendous cocktail of vulnerabilities and exploitations with big names like Sony, eBay, and Amazon falling prey to security breaches.

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!