Indusface

Indusface is a leading application security SaaS company that secures critical Web, Mobile, and API applications of 5000+ global customers using its award-winning fully managed platform that integrates web application scanner, web application firewall, DDoS & BOT Mitigation, CDN, and threat intelligence engine.
Web Browser-Based Attacks – Types, Examples, and Prevention

Web Browser-Based Attacks – Types, Examples, and Prevention

A web browser attack targets vulnerabilities in web browsers to compromise user data. These attacks often involve injecting malicious code… Read More

2 months ago

What’s New in OWASP API Top 10 2023: The Latest Changes and Enhancements

The OWASP API Top 10 2023 list has quite a few changes from the 2019 Top 10 API security risks.… Read More

11 months ago

API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods

Security misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently… Read More

11 months ago

API5:2019 Broken Function Level Authorization: The What, Impact, Sample Exploit, and Prevention Methods

Broken function-level authorization vulnerabilities enable unauthorized users to access or execute functions they should not have access to. Read More

12 months ago

API3:2019 Excessive Data Exposure: Understanding the Risks, Impacts, and How to Prevent It

Excessive data exposure occurs when APIs reveal more fields, data, and information than the client requires through the API response. Read More

12 months ago

The Ultimate API Penetration Testing Checklist [ Free Excel File]

Check out the API Penetration Testing checklist, which outlines how to conduct an effective API security assessment for your organization. Read More

1 year ago

App Development Companies are Emphasizing Security in Their AMC Contracts | Puneet Miglani (Founder, Candor)

In this session, Puneet Miglani (Founder – Candor Technology) discusses with Venky how app development companies are emphasizing security in… Read More

1 year ago

A Sub-Domain Takeover Story, Two Questions for Every WAF Provider | Sunil Agrawal (CISO, Glean)

Sunil Agrawal (CISO, Glean) shared his experience on the sub-domain takeover and how it led him to build foundationally secured… Read More

1 year ago

SOC 2 Compliance for SaaS Startups & Top Pitfalls to Avoid

In this episode of SaaSTrana, Venky and Raghu, Co-Founder of Sprinto, discusses why SaaS companies should pay close attention to… Read More

1 year ago

API4:2019 – Lack of Resources & Rate Limiting: The What, Sample Exploit, and Prevention Methods

Lack of resources & rate limiting is #4 on the OWASP Top 10 API Security Risks 2019. When the app/… Read More

1 year ago

19 Cybersecurity Trends Every CISO Must Prepare for in 2023

Cybersecurity threats are evolving rapidly, and CISOs must be ready to face the challenge. Be prepared for the top trends… Read More

1 year ago

OWASP API1: 2019 – Broken Object Level Authorization

Are you leaving your APIs vulnerable to attacks? OWASP revealed that Broken Object Level Authorization is among the top 10… Read More

1 year ago

App Security & Compliance for SaaS Companies in Saudi Arabian Market

Cyber insurance is an enabler for enterprise contracts. Founder of Marmin.AI shares how having a strong AppSec process, including VAPT… Read More

1 year ago

SaaS AppSec Stories on Malware, Sleepless Nights and DevSecOps | Kashish Jajodia (CTO, Draup)

Kashish, CTO at Draup, talks about how he looks at vulnerability assessment, penetration testing, and application security. What drives Draup… Read More

1 year ago

How To Keep Your Business Prepared for this Holiday Hacking Season?

Holidays are around the corner, and so are the hackers. Have you taken any steps to protect your business? Here… Read More

1 year ago

How Your Business Can Achieve Cybersecurity Compliance?

Cybersecurity compliance should be your first step to implementing the right security technologies. Here is an in-depth guide outlining cybersecurity… Read More

1 year ago

DDoS Mitigation – Why Your Traditional Security Fails?

DDoS attacks are among the most rapidly advancing type of cybercrime. Traditional DDoS mitigation is not enough to counter these… Read More

1 year ago

API Scanning: How to Scan API Endpoints?

How to secure your API endpoint? API scanning can help you secure endpoints. It also optimizes it for better reliability… Read More

1 year ago