 November 22, 2016
November 22, 2016 3  min Read
  3  min ReadHow Secure Are Your Apps in Cloud?
Today, cloud is an intrinsic part of business strategies focusing on product availability, maintaining uptime, scaling rapidly, and reducing infrastructure
Read the Latest State of Application Security Report (H1 2025) and Stay Ahead of Threats: Download now!
 November 22, 2016
November 22, 2016 3  min Read
  3  min ReadToday, cloud is an intrinsic part of business strategies focusing on product availability, maintaining uptime, scaling rapidly, and reducing infrastructure
 November 10, 2016
November 10, 2016 4  min Read
  4  min ReadToday, 21 million websites use the top 20 Content Management Systems (CMS) with access to more than 67 thousand free plugins. WordPress is by far
 November 10, 2016
November 10, 2016 2  min Read
  2  min ReadWindows application comprises of various folders and files. These files includes executables, dll and various other formats. A dll is loaded dynamically
 October 20, 2016
October 20, 2016 3  min Read
  3  min ReadDespite all the media attention on large enterprise data breaches such as Yahoo and TalkTalk, small and medium sized enterprises (SME) don’t feel that they
 September 28, 2016
September 28, 2016 4  min Read
  4  min ReadIn this recent massive breach, hackers managed to steal email ids, passwords, birthdates and telephone numbers of half a billion users
 September 20, 2016
September 20, 2016 3  min Read
  3  min ReadAutomated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding
 September 20, 2016
September 20, 2016 2  min Read
  2  min ReadI am writing this to announce a new deployment model for Total Application Security (TAS) in AWS. As you all will know, Indusface announced its marketplace launch on April 20th.
 August 30, 2016
August 30, 2016 3  min Read
  3  min ReadWhat a year it has been so far. With millions of records stolen and thousands of dollars spent in covering from breaches and downtime, what do we get to
 August 16, 2016
August 16, 2016 4  min Read
  4  min ReadWhen anyone can hire machines with advanced processing powers, how difficult you think it is to launch application level distributed denial-of-services?
 July 12, 2016
July 12, 2016 2  min Read
  2  min ReadDo you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP educative series and we helped you understand
 July 5, 2016
July 5, 2016 < 1  min Read
  < 1  min ReadSources: Identity Theft Resource Center Data Breach Investigations Report Indusface Research …
 June 21, 2016
June 21, 2016 3  min Read
  3  min Readcybersecurity questions to few of our readers and cybersecurity experts. Here are a few of them. Question 1 to Kevin Du, Senior Member at the Institute


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™