How was your 2016? We know that for most businesses it was a little rough especially on the cybersecurity front. As more and more companies prepare for cloud and digital domains, there is growing ambiguity on security. Unfortunately, 2016 didn’t help. In fact, it was the weakest year in the history with close to a thousand reported data breaches.

Number of Data Breach Incidents-Yearly

5 Most Shared Application Security Posts in 2016

As we predicted last year, in our trend prediction blog post, ransomware, app DDoS and loss of Personally Identifiable Information (PII) created most trouble for big and small businesses. We hope that this article helped our clients and readers close weak points well in advance.

Not that we look back, our research articles reached thousands of people worldwide helping them overcome security challenges. So, we bring you a list of top five most shared posts that will prove valuable in the coming year too.

What Is SQL Injection?

How can a 17-year old vulnerability still top the OWASP Top 10 list? Given that SQL Injection is accountable for most data breaches, this post provides valuable information on understanding the vulnerability, its impact and ways to get rid of it.

OWASP Part 4: Mobile Application Risks

The last part of our popular OWASP Top 10 Series juxtaposed user-friendliness with security loopholes. It helped business owners look for loopholes in their mobile apps and close the gaps with the help of their team.

Google URLs Found Vulnerable to Open Redirect

What can a simple vulnerability such Open Redirection do? Should businesses and customers really worry about them? This post sheds light on how invalidated redirects and forwards cause damage to business reputation and loss of business.

6 Things You Should Know About DDoS Attacks

Application layer DDoS attacks cause massive damage, especially by taking the website down for hours or days. This research article shatters many perceptions on Layer 7 attacks and how they affect every company that has a website.

3 Steps to Stop Hackers

Is there a simple guide for application security? Bookmark this one for all your questions on finding security loopholes, fixing them instantly and stopping app DDoS attacks.

Founder & Chief Marketing Officer, Indusface

Venky has played multiple roles within Indusface for the past 6 years. Prior to this, as the CTO @indusface, Venky built the product/service offering and technology team from scratch, and grew it from ideation to getting initial customers with a proven/validated business model poised for scale. Before joining Indusface, Venky had 10+ years of experience in security industry and had held various mgmt/leadership roles in Product Development, Professional Services and Sales @Entrust.