Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconOctober 7, 2014
Clock Icon 3 min Read
Hey Experts, Is Application Security your Stepchild?

The web has evolved and has changed from providing only static experience to an interactive and dynamic platform which is being used today by all major businesses and organizations to.

Read More...
Calender IconOctober 1, 2014
Clock Icon 3 min Read
Is Cloud Secure?

Thousands of businesses are moving to cloud? But is cloud secure? Can you simply leave everything on the cloud provider?

Read More...
Calender IconSeptember 26, 2014
Clock Icon 2 min Read
While the world is shell shocked, our customer are preparing for the weekend

The world is shell-shocked! And while the system owners are busy understanding the vulnerability and are still finding out ways to detect it, attackers are not showing any mercy. We.

Read More...
Calender IconSeptember 25, 2014
Clock Icon 3 min Read
How Not to Get BASH-ed

A major vulnerability in the Bourne Shell — called bash shell – has come to the fore. This vulnerability existed from a long time.

Read More...
Calender IconSeptember 23, 2014
Clock Icon 3 min Read
Cybercriminals Piggybacking on Google’s DoubleClick for Rapid Distribution

As per a latest report, Cybercriminals have exploited the power of two online advertising networks, Google’s DoubleClick and popular Zedo advertising agency.

Read More...
Calender IconSeptember 22, 2014
Clock Icon 6 min Read
Gmail hacked- how to check if your account is safe?

By Indusface Research Team As per some reports, Gmail has been hacked and 5 million user names and passwords were stolen from compromised accounts. What does this mean for you?.

Read More...
Calender IconSeptember 12, 2014
Clock Icon < 1 min Read
State of Application Security in India

Read More...
Calender IconSeptember 10, 2014
Clock Icon 5 min Read
After iCloud massacre, it’s time to re-visit the tips to secure your data on Cloud

Hollywood stars are all over the internet, and not because of Emmys, but because some nut job stole their nude photos and leaked them online. From cloud…nope, iCloud! I can.

Read More...
Calender IconSeptember 8, 2014
Clock Icon 5 min Read
Big Data Requires Bigger Security, But Is It As Complex As It Dounds?

Discover the essence of Big Data and essential tips for safeguarding your valuable information in this comprehensive guide.

Read More...
Calender IconSeptember 2, 2014
Clock Icon 4 min Read
OWASP A9 Using Components with Known Vulnerabilities

The use of 3rd party frameworks and libraries in application development has become a very common practice but unfortunately most of the time, proper security policies aren’t implemented to mitigate the.

Read More...
Calender IconAugust 22, 2014
Clock Icon 3 min Read
Heartbleed still bleeding your security?

Google and Codenomicon were responsible for finding the Heartbleed bug which had remained hidden for more than two years.

Read More...
Calender IconAugust 20, 2014
Clock Icon 4 min Read
How to secure Internet of Things?

The world we live in today is connected 24*7, with people always being attached to technology, even when on the move. And what is taking this mobile connectivity to another.

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!