Venkatesh Sundar

Venky is an Application Security technologist who built the new age Web application Scanner and Cloud WAF - AppTrana at Indusface as a Founding CTO. Currently, he spends his time on driving Product Roadmap, Customer Success, Growth, and technology adoption for US businesses.
15 Web Application Security Best Practices

15 Web Application Security Best Practices

Enhance web application security with best practices: threat modeling, vulnerability analysis, patching critical issues, and deploying virtual patching/WAF Read More

4 weeks ago

How to Prevent SQL Injection Attacks?

SQL injection has been troubling websites from over 17 years. It’s about time that you find out what it’s all… Read More

1 month ago

Zero-day Vulnerability – Examples, Detection & Prevention [+ Monthly 0-day Reports]

Zero-day vulnerabilities refer to unpatched flaws exploited by attackers before fixes, posing significant security risks to both software and hardware. Read More

3 months ago

What is XML-RPC? Benefits, Security Risks, and Detection Techniques

vulnerability. An attacker may exploit this issue to execute arbitrary commands or code in the context of the webserver. This… Read More

4 months ago

What is Vulnerability Testing? Benefits, Tools, and Process

Vulnerability testing systematically identifies and evaluates weaknesses in digital systems, enabling proactive cybersecurity measures and threat mitigation. Read More

4 months ago

10 Botnet Detection and Removal Best Practices

Defend against botnet attacks with strategies like understanding infiltration, threat identification, access control, authentication, and monitoring software. Read More

4 months ago

35 Most Notorious Hacks in History that Fall Under OWASP Top 10

What were the most notorious hacks in history? They’re subject to debate, but we bring you 27 of them, which… Read More

5 months ago

How Does a WAF Work?

A Web Application Firewall (WAF) enhances cybersecurity by filtering and blocking malicious traffic, protecting web applications from attacks like SQLi… Read More

5 months ago

How to Choose the Best Website Penetration Testing Tool?

Secure your assets effectively by choosing the right website penetration testing tools. Gain insights for optimal selection Read More

7 months ago

Penetration Testing: A Complete Guide

Penetration Testing, also called pen testing, is a process to identify, exploit, and report vulnerabilities in applications, services, or operating… Read More

7 months ago

What is Cross-Site Scripting (XSS)? Types of XSS, Examples, and Patching Best Practices

Cross-Site Scripting (XSS) is a security vulnerability that allows an attacker to inject malicious code into a web page viewed… Read More

1 year ago

What is Slowloris DDoS Attack and How Does it Work?

A Slowloris attack is a type of distributed denial-of-service (DDoS) attack that overwhelms a web server by keeping numerous connections… Read More

1 year ago

How Do You Maintain Secure Remote Working?

79% of organizations agreed that remote working had negatively impacted their cybersecurity. You must be prepared to address remote work… Read More

1 year ago

Website Security Checklist for Business Owners

Website security checklist. Ensure that you follow this checklist to stop hackers, protect customers and prevent business downtime. Read More

2 years ago

Best DDoS Protection Services

With the growth of botnets, it’s compulsory to have a well-structured DDoS protection service. Here are 7 best practices that will… Read More

4 years ago

Reasons Why SaaS Businesses Absolutely Need Website Security

Discover why website security is essential for SaaS businesses to protect against cyber threats and maintain customer trust. Read More

5 years ago

OWASP Top 10 Vulnerabilities

The first part of OWASP Top 10 series on web and mobile applications. It explains how OWASP 10 vulnerabilities help… Read More

5 years ago

Things to Consider When Choosing a SaaS Security Provider

These are considerations for you to make when choosing any SaaS service provider be it – web development, CRM, file… Read More

5 years ago