March 28, 201712 of the Most Notorious Hacks in HistoryWhat were the most notorious hacks in history? They’re subject to debate, but we bring you 12 of them, which would be strong...Read More March 21, 2017The Best Tools to Improve Your Company’s SecurityAnyone can get hacked. Lucky the tools are out there. Analyze your most pressing needs, and then get the right security tool to...Read More March 16, 2017Apache Struts Under Attack- Indusface Securing Customers from Day ZeroA remote code execution flaw was discovered in the widely-used Apache Struts 2 framework. Attackers continue to exploit vulnerable...Read More March 8, 20176 Steps to Best Practice in Application Security in 2017Our analysts bring you a best practice guide to kick-start your application security this year. It has everything you need to...Read More February 17, 2017The Best Predictions for Cyber Threats in 2017Though we’re barely more than a month into 2017, news reports are already flooding in describing cyber security attacks carried...Read More February 3, 2017Android Security Overview for 2016Statistically Android has around 75-80 percent of the worldwide smartphone market, which leads us to believe that it is the most...Read More January 31, 20175 Most Shared Application Security Posts in 2016As more and more companies prepare for cloud and digital domains, there is growing ambiguity on application security. Read about...Read More January 16, 2017SQL Injection Vulnerability and the U.S. Election AgencyAccording to the researchers, hackers were continuously scanning the assets associated with the US presidential elections looking...Read More January 5, 2017Security Lessons Learned in 2016More than 2.2 billion records were stolen last year in almost 3,000 public data breaches. While the media spotlight was on big...Read More December 13, 20163 Steps to Stop HackersWouldn’t it be great if you fix security holes the same day they are found? But, we all know how that plan goes. Loaded task...Read More November 29, 2016What Is SQL Injection?SQL injection has been troubling websites from over 17 years. It’s about time that you find out what it’s all about and how...Read More November 22, 2016Cloud Security from Public Cloud Vendors- Does it cover your Application Security?Today, cloud is an intrinsic part of business strategies focusing on product availability, maintaining uptime, scaling rapidly,...Read More LOAD MORE Want more free content delivered straight to your inbox? Simply enter your email below and receive more great content and industry updates direct to your inbox Get Free Content Thanks for signing up!