Venkatesh Sundar

3 Ways to Prevent Zero-Day Attacks

3 Ways to Prevent Zero-Day Attacks

Zero-Day attackers exploit undisclosed vulnerabilities that are unknown to application vendor or developer. Detection and patching can take weeks. Read More

7 years ago

3 Recommendations to Overcome Web Application Security

Are web application security challenges troubling your business? Here are the top expert recommendations to help you find weaknesses and… Read More

7 years ago

8 Ransomware Protection and Prevention Tips

Ransomworm came into the mainstream when WannaCry’s global hack compromised hundreds of thousands of computers. Victims ranging from individuals to… Read More

7 years ago

What’s Being Discussed at the Biggest Cyber Security Conferences in 2017

A timeline is an essential part of many forensics/incident response cases. Attendees of this presentation will learn how to create… Read More

7 years ago

Petya Ransomware Attack: Deadlier Than WannaCry?

Dubbed NotPetya because it masquerades as the Petya ransomware, it has already hit more than 2000 computers in a dozen… Read More

7 years ago

AWS Security Best Practices: The Complete Guide

AWS Cloud can help streamline your business but you still need to be diligent about security. Here’s our handy AWS… Read More

7 years ago

Everything You Need to Know About Cyber Insurance

Not sure where to start with cyber insurance? Learn what it means for business and dig deeper to identify where… Read More

7 years ago

3 Ways to Identify and Protect Yourself from Bots

Bot attacks difficult to trace and monitor as they use computing power and resources from trusted networks. Read how they… Read More

7 years ago

WannaCry Ransomware Attack: How to Protect Your Business?

WannaCry ransomware attack has crippled both public and private sector. Here’s how you can protect critical files before hackers encrypt… Read More

7 years ago

What is Ethical Hacking?

The idea may sound counterintuitive, but ethical hackers can actually empower small and large businesses for the better by using… Read More

7 years ago

How to Identify & Prevent Web Application Hacks Before They Happen

It’s estimated that 30,000 websites are hacked and infected. Learn how to find vulnerabilities in your web applications and prevent… Read More

7 years ago

Everything Startups Need to Know About CyberSecurity

Keeping your startup safe from hackers, data loss and breaches takes more than just a firewall and antivirus software. Here… Read More

7 years ago

46 Ways to Stop Ecommerce Security Threats

Anyone can get hacked. Lucky the tools are out there. Analyze your most pressing needs, and then get the right… Read More

7 years ago

Apache Struts Under Attack- Indusface Securing Customers from Day Zero

A remote code execution flaw was discovered in the widely-used Apache Struts 2 framework. Attackers continue to exploit vulnerable (unpatched)… Read More

7 years ago

The Best Predictions for Cyber Security in 2017

Though we’re barely more than a month into 2017, news reports are already flooding in describing cyber security attacks carried… Read More

7 years ago

5 Most Shared Application Security Posts in 2016

As more and more companies prepare for cloud and digital domains, there is growing ambiguity on application security. Read about… Read More

7 years ago

SQL Injection Vulnerability and the U.S. Election Agency

According to the researchers, hackers were continuously scanning the assets associated with the US presidential elections looking for weakness to… Read More

7 years ago

Security Lessons Learned in 2016

More than 2.2 billion records were stolen last year in almost 3,000 public data breaches. While the media spotlight was… Read More

7 years ago