Phani Deepak Akella

Phani heads the marketing function at Indusface. He handles product marketing and demand generation. He has worked in the product marketing function for close to a decade and specializes in product launches, sales enablement and partner marketing. In the application security space, Phani has written about web application firewalls, API security solutions, pricing models in application security software and many more topics.
What is XML External Entity, How to Find XXE Vulnerabilities and Patch Them

What is XML External Entity, How to Find XXE Vulnerabilities and Patch Them

XXE (XML External Entity) vulnerability is a type of security flaw that occurs when an XML parser processes input from… Read More

3 months ago

API Security Standards and Protocols: A Primer

Explore crucial API security protocols, including SAML, OAuth 2.0, and JWT, ensuring robust authentication and authorization for safeguarding endpoints. Read More

5 months ago

DDoS Attack Mitigation Playbook for SOC and DevOps Teams

Facing DDoS threats? Arm your SOC & DevOps teams with effective mitigation strategies. Explore geo-fencing, IP blacklisting, and rate limiting… Read More

5 months ago

DDoS Traffic Analysis Techniques for SOC Teams

Equip your SOC team to analyze and counter application layer DDoS attacks for enhanced security. Explore key strategies for DDoS… Read More

6 months ago

Fundamentals of Origin Server Protection

Learn the essentials of origin server protection: Discover why protecting your servers is crucial and explore effective strategies to ensure… Read More

8 months ago

API Security: Authorization, Rate Limiting, and Twelve Ways to Protect APIs

41% of organizations suffered an API security incident. Here are 12 methods that you need to incorporate in order to… Read More

12 months ago

The Role of WAAP Platforms in the CI/CD Pipeline

A WAAP solution could play a critical role in CI/CD process. It helps protect apps and APIs from threats throughout… Read More

12 months ago

Six Key Considerations When Deploying a Web Application Firewall

Looking for a web application firewall? Consider these six key consideration to make an informed choice for your web security… Read More

1 year ago

Cloud WAF Pricing: All You Need to Know

Explore Cloud WAF pricing and different options and factors to find the perfect fit for your web application security requirements. Read More

1 year ago

16 Ways Cloud WAFs are Better than On-Premise WAFs

Cloud WAFs outperform On-Premise WAFs in multiple ways - find out how in our breakdown of 16 key advantages. Read More

1 year ago

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods

API2:2019 Broken User Authentication happens when an attacker bypasses an API's authentication and authorization mechanisms and gains access to sensitive… Read More

1 year ago