12 of the Most Notorious Hacks in History

What were the most notorious hacks in history? They’re subject to debate, but we bring you 12 of them, which would be strong...

Read More

The Best Tools to Improve Your Company’s Security

Anyone can get hacked. Lucky the tools are out there. Analyze your most pressing needs, and then get the right security tool to...

Read More

Apache Struts Under Attack- Indusface Securing Customers from Day Zero

A remote code execution flaw was discovered in the widely-used Apache Struts 2 framework. Attackers continue to exploit vulnerable...

Read More

6 Steps to Best Practice in Application Security in 2017

Our analysts bring you a best practice guide to kick-start your application security this year. It has everything you need to...

Read More

The Best Predictions for Cyber Threats in 2017

Though we’re barely more than a month into 2017, news reports are already flooding in describing cyber security attacks carried...

Read More

Android Security Overview for 2016

Statistically Android has around 75-80 percent of the worldwide smartphone market, which leads us to believe that it is the most...

Read More

5 Most Shared Application Security Posts in 2016

As more and more companies prepare for cloud and digital domains, there is growing ambiguity on application security. Read about...

Read More

SQL Injection Vulnerability and the U.S. Election Agency

According to the researchers, hackers were continuously scanning the assets associated with the US presidential elections looking...

Read More

Security Lessons Learned in 2016

More than 2.2 billion records were stolen last year in almost 3,000 public data breaches. While the media spotlight was on big...

Read More

3 Steps to Stop Hackers

Wouldn’t it be great if you fix security holes the same day they are found? But, we all know how that plan goes. Loaded task...

Read More

What Is SQL Injection?

SQL injection has been troubling websites from over 17 years. It’s about time that you find out what it’s all about and how...

Read More

Cloud Security from Public Cloud Vendors- Does it cover your Application Security?

Today, cloud is an intrinsic part of business strategies focusing on product availability, maintaining uptime, scaling rapidly,...

Read More

Want more free content delivered straight to your inbox?

Simply enter your email below and receive more great content and industry
updates direct to your inbox