March 21, 2017
11 min Read46 Ways to Stop Ecommerce Security Threats
Anyone can get hacked. Lucky the tools are out there. Analyze your most pressing needs, and then get the right security tool to make it disappear.
Upcoming Webinar : Security Foundations for Agentic AI - Register Now !
March 21, 2017
11 min ReadAnyone can get hacked. Lucky the tools are out there. Analyze your most pressing needs, and then get the right security tool to make it disappear.
March 16, 2017
3 min ReadA remote code execution flaw was discovered in the widely-used Apache Struts 2 framework. Attackers continue to exploit vulnerable (unpatched) systems.
February 17, 2017
8 min ReadThough we’re barely more than a month into 2017, news reports are already flooding in describing cyber security attacks carried out this year.
February 3, 2017
6 min ReadStatistically Android has around 75-80 percent of the worldwide smartphone market, which leads us to believe that it is the most popular OS used by mobile
January 31, 2017
2 min ReadAs more and more companies prepare for cloud and digital domains, there is growing ambiguity on application security. Read about the top appsec threats.
January 5, 2017
3 min ReadMore than 2.2 billion records were stolen last year in almost 3,000 public data breaches. While the media spotlight was on big brand mishaps like that
November 22, 2016
3 min ReadToday, cloud is an intrinsic part of business strategies focusing on product availability, maintaining uptime, scaling rapidly, and reducing infrastructure
November 10, 2016
4 min ReadToday, 21 million websites use the top 20 Content Management Systems (CMS) with access to more than 67 thousand free plugins. WordPress is by far
November 10, 2016
2 min ReadWindows application comprises of various folders and files. These files includes executables, dll and various other formats. A dll is loaded dynamically
October 20, 2016
3 min ReadDespite all the media attention on large enterprise data breaches such as Yahoo and TalkTalk, small and medium sized enterprises (SME) don’t feel that they
September 28, 2016
4 min ReadIn this recent massive breach, hackers managed to steal email ids, passwords, birthdates and telephone numbers of half a billion users
September 20, 2016
3 min ReadAutomated attacks are: Credential stuffing Scraping Application layer DDoS Captcha Bypass Card Cracking Credential cracking Cashing Out Carding


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™