Categories: Cybersecurity

7 Trending Indusface Research Articles

It’s easy to lose track of things when so much information is shared. Data breaches, application distributed denial-of-services, security mishaps, and tips, there is so much that you might need to catch up on. That’s why we bring you the most viewed and trending security stories on topics that you care about.

OWASP Top 10, Hacking, and Business Impact– Part 1

This OWASP educative series on web and mobile applications breaks down vulnerabilities and simplify them to the basic level of their nature and implications with examples and illustrations. It’s the simplest way to understand how data breaches happen.

What New-Age Businesses Should Know About Website Security?

You know that it really matters when statistics show that there are more than one billion people buying online. In fact, that number is growing with internet and smartphone penetration across the globe. It has been estimated that the growth resonates across both B2B and B2C markets, opening gates for huge opportunities across sectors. But, why are so many business owners scared of hackers?

32 Cybersecurity Facts to Learn From

Many information security lapses happened this year. Records were lost, money was lost, higher management professionals quit, and budgets were reshuffled to improve application security. Here you will find all of it.

Deadly App DDoS and How to Stop It

“Let’s assume the server to be a person. Denial of Service (DoS) is assaulting the person and not letting him communicate with anyone. Now imagine this person being assaulted and muzzled by 45, 000 people at once, that’s Distributed Denial of Service (DDoS).” And how do you avoid it?

8 Things You Should Know About DDoS Attacks

With businesses increasingly depending on their websites amid fierce competition and highly motivated hackers, distributed denial-of-services risks are more than ever. On an average, application DDoS attack costs $5 an hour. We have more for you here.

OWASP Part 3: Mobile Application Risks

When Frank launched the mobile app for Fishery of Randomland, it was named ‘iFish’, a project that he thought would take his business forward.  Just like with any other city, people at Randomland were obsessed with smartphones. They loved the technology, its ease, and capabilities that apps provided. What went wrong?

All You Need to Know About SQL Injection

The suspect in question is 17 years old, difficult to trace, takes subtle attack approaches, and has been single-handedly responsible for 81,158,074 attack attempts across the world. In 2013, it even topped the OWASP list of Top 10 vulnerabilities. What is it?

Venkatesh Sundar

Venky is an Application Security technologist who built the new age Web application Scanner and Cloud WAF - AppTrana at Indusface as a Founding CTO. Currently, he spends his time on driving Product Roadmap, Customer Success, Growth, and technology adoption for US businesses.

This post was last modified on September 7, 2023 16:07

Share
Venkatesh Sundar
Published by
Venkatesh Sundar

Recent Posts

Managed WAF: A Must-Have to Stop Website Attacks

A Managed WAF is a comprehensive cybersecurity service offered by specialized providers to oversee, optimize,… Read More

3 days ago

Top 10 Best Practices for Attack Surface Reduction

Explore crucial tactics like Asset Inventory, Patch Management, Access Control & Authentication, and additional best… Read More

2 weeks ago

10 Important Data Privacy Questions You Should be Asking Now

Delve into the data privacy questions including consent protocols, data minimization strategies, user rights management,… Read More

2 weeks ago