March 9, 2015
3 min ReadFREAK Vulnerability
It’s the twisted, forgotten nightmare. A security loophole from the early 90s, which nobody really remembers, has come back to haunt around 33% of all the websites and servers across the world
Read the Latest State of Application Security Report (H1 2025) and Stay Ahead of Threats: Download now!
March 9, 2015
3 min ReadIt’s the twisted, forgotten nightmare. A security loophole from the early 90s, which nobody really remembers, has come back to haunt around 33% of all the websites and servers across the world
March 4, 2015
4 min ReadEarlier this year, French security firm VUPEN netted a whopping $400, 000 in the HP Tipping Point’s Zero Day Initiative as annual hacking contest .
February 19, 2015
3 min ReadBusinesses simply cannot afford to wait for cybercrime to happen. Learn about the risks and ways to mitigate them before it’s late.
February 11, 2015
4 min ReadPrime Minster Narendra Modi’s Digital India Campaign has the potential to be one of the most transformative programs launched in recent times.
January 30, 2015
3 min ReadCVE-2015-0235 is being called the GHOST Vulnerability as it exploits glibc’s GetHOST functions. It basically affects Linux glibc or GNU C library on versions prior to glibc-2.18. Now, GNU C Library is a core part of the Linux operating system in glibc 2.2 to glibc 2.17
January 12, 2015
5 min ReadPayment Card Industry Data Security Standards (PCI DSS) guidelines- Often seen as just another mandatory list to be checkmarked, PCI 3.0 is here to make that change.
December 12, 2014
3 min ReadGandhi and application security? Here are some of his Indusface favorites that can inspire security in your organization.
December 9, 2014
5 min ReadAnd if this data in question, falls into the wrong hands, then unfortunately the victims will suffer more than just financial loss. The year 2014 might just turn out to be the Year of Data Breaches
December 3, 2014
3 min ReadMen have come together to form groups, towns, cities, and nations to establish their supremacy in different ways. Supremacy, as many would agree, does not come without the call for.
November 25, 2014
3 min ReadIt’s Déjà vu. In 2010, a malware called Stuxnet introduced the world to a cyber-weapon which could affect major industries of nations. Learn more about it here.
November 20, 2014
3 min ReadDespite what some skeptics say, the move of major organizations to Cloud shows that Cloud is here to stay. CIA has moved to the cloud, so have many other major.
November 17, 2014
4 min ReadIDC, a research and analyst firm, predicts that by 2016, 480 million smartphones will be shipped worldwide. An estimated 65 percent of these 480 million phones will be used for.


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™