Venkatesh Sundar

How to Protect Website from Hackers?

How to Protect Website from Hackers?

Wouldn’t it be great if you fix security holes the same day they are found? But, we all know how… Read More

7 years ago

How Secure Are Your Apps in Cloud?

Today, cloud is an intrinsic part of business strategies focusing on product availability, maintaining uptime, scaling rapidly, and reducing infrastructure Read More

7 years ago

How to Secure WordPress Website from Hackers?

Today, 21 million websites use the top 20 Content Management Systems (CMS) with access to more than 67 thousand free… Read More

8 years ago

Application Security for Startups and SMEs

Despite all the media attention on large enterprise data breaches such as Yahoo and TalkTalk, small and medium sized enterprises… Read More

8 years ago

Yahoo Data Breach: Can It Affect Your Business?

In this recent massive breach, hackers managed to steal email ids, passwords, birthdates and telephone numbers of half a billion… Read More

8 years ago

What Are Automated Attacks?

Automated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding Read More

8 years ago

Availability of BYOL option for TAS in AWS

I am writing this to announce a new deployment model for Total Application Security (TAS) in AWS. As you all… Read More

8 years ago

20 Website Security Stats from 2016

What a year it has been so far. With millions of records stolen and thousands of dollars spent in covering… Read More

8 years ago

DDoS Attack Protection Online on Websites

When anyone can hire machines with advanced processing powers, how difficult you think it is to launch application level distributed… Read More

8 years ago

SQL Injection in Panama Paper Leak

How did the biggest document leak happen? Before tha Read More

8 years ago

Application Layer 7 DDoS Attack Protection

DDoS attack as an operational problem. They try hard to prove that it’s not their fault and completely overlook the… Read More

8 years ago

31 Google URLs Vulnerable to Open Redirect

Do you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP educative series… Read More

8 years ago

Major Cyber Security Numbers – 2016

Sources: Identity Theft Resource Center Data Breach Investigations Report Indusface Research ... Read More

8 years ago

We Asked 6 Random Cybersecurity Questions

cybersecurity questions to few of our readers and cybersecurity experts. Here are a few of them. Question 1 to Kevin… Read More

8 years ago

Ecommerce Website Security Best Practices

ecommerce websites receive anywhere from 200 million to 2 billion visitors in a year. Of course, that is huge when… Read More

8 years ago

93 Small Business CyberSecurity Guide

How do you secure website from hackers? Look at some of the expert tips and ensure that hackers stay away… Read More

8 years ago

My DDoS Story

What is a DDoS? How to stop it? Learn what happened at Fishery of Randomland and how Frank survived a… Read More

8 years ago

The End of Application Security As You Know It

The current ‘automating everything’ approach for application security shouldn’t be just replaced. It should be buried down under for greater… Read More

8 years ago