It’s easy to lose track of things when so much information is shared. Data breaches, application distributed denial-of-services, security mishaps, and tips, there is so much that you might need to catch up on. That’s why we bring you the most viewed and trending security stories on topics that you care about.

OWASP Top 10, Hacking, and Business Impact– Part 1

7 Most Shared Indusface Research Articles

This OWASP educative series on web and mobile applications breaks down vulnerabilities and simplify them to the basic level of their nature and implications with examples and illustrations. It’s the simplest way to understand how data breaches happen.

What New-Age Businesses Should Know About Website Security?

7 Most Shared Indusface Research Articles

You know that it really matters when statistics show that there are more than one billion people buying online. In fact, that number is growing with internet and smartphone penetration across the globe. It has been estimated that the growth resonates across both B2B and B2C markets, opening gates for huge opportunities across sectors. But, why are so many business owners scared of hackers?

32 Cybersecurity Facts to Learn From

7 Most Shared Indusface Research Articles

Many information security lapses happened this year. Records were lost, money was lost, higher management professionals quit, and budgets were reshuffled to improve application security. Here you will find all of it.

Deadly App DDoS and How to Stop It

7 Most Shared Indusface Research Articles

“Let’s assume the server to be a person. Denial of Service (DoS) is assaulting the person and not letting him communicate with anyone. Now imagine this person being assaulted and muzzled by 45, 000 people at once, that’s Distributed Denial of Service (DDoS).” And how do you avoid it?

8 Things You Should Know About DDoS Attacks

7 Most Shared Indusface Research Articles

With businesses increasingly depending on their websites amid fierce competition and highly motivated hackers, distributed denial-of-services risks are more than ever. On an average, application DDoS attack costs $5 an hour. We have more for you here.

OWASP Part 3: Mobile Application Risks

7 Most Shared Indusface Research Articles

When Frank launched the mobile app for Fishery of Randomland, it was named ‘iFish’, a project that he thought would take his business forward.  Just like with any other city, people at Randomland were obsessed with smartphones. They loved the technology, its ease, and capabilities that apps provided. What went wrong?

All You Need to Know About SQL Injection

7 Most Shared Indusface Research Articles

The suspect in question is 17 years old, difficult to trace, takes subtle attack approaches, and has been single-handedly responsible for 81,158,074 attack attempts across the world. In 2013, it even topped the OWASP list of Top 10 vulnerabilities. What is it?

Founder & Chief Marketing Officer, Indusface

Venky has played multiple roles within Indusface for the past 6 years. Prior to this, as the CTO @indusface, Venky built the product/service offering and technology team from scratch, and grew it from ideation to getting initial customers with a proven/validated business model poised for scale. Before joining Indusface, Venky had 10+ years of experience in security industry and had held various mgmt/leadership roles in Product Development, Professional Services and Sales @Entrust.