April 17, 2015
4 min ReadEverything About Mobile Application Security Testing
How strong is your mobile application security foundation? Take a look at why mobile apps should be a cause of information security worry for your business.
Read the Latest State of Application Security Report (H1 2025) and Stay Ahead of Threats: Download now!
April 17, 2015
4 min ReadHow strong is your mobile application security foundation? Take a look at why mobile apps should be a cause of information security worry for your business.
April 8, 2015
4 min ReadHackers around the world are making big money by just selling stolen data. Find out how these data breaches happen and how they can can cost your company.
April 2, 2015
4 min ReadMobile security not bothering you? You have got to be someone living away from all the application security worries we mere mortals are dealing with or you could be one of those people who think
March 17, 2015
6 min ReadHow many types of firewalls are there? Is a single firewall enough to all your problems? Find out answers to most common firewall questions with Indusface
March 13, 2015
3 min ReadTraffic is valuable for sales, opportunities and prospects. What if you security mechanism is unknowingly blocking real-traffic. Find out more about it.
March 11, 2015
4 min ReadIn online transactions, security is the only way to win customers in the business. Find the problems that should be resolved with online payment security.
March 9, 2015
3 min ReadIt’s the twisted, forgotten nightmare. A security loophole from the early 90s, which nobody really remembers, has come back to haunt around 33% of all the websites and servers across the world
March 4, 2015
4 min ReadEarlier this year, French security firm VUPEN netted a whopping $400, 000 in the HP Tipping Point’s Zero Day Initiative as annual hacking contest .
February 19, 2015
3 min ReadBusinesses simply cannot afford to wait for cybercrime to happen. Learn about the risks and ways to mitigate them before it’s late.
February 11, 2015
4 min ReadPrime Minster Narendra Modi’s Digital India Campaign has the potential to be one of the most transformative programs launched in recent times.
January 30, 2015
3 min ReadCVE-2015-0235 is being called the GHOST Vulnerability as it exploits glibc’s GetHOST functions. It basically affects Linux glibc or GNU C library on versions prior to glibc-2.18. Now, GNU C Library is a core part of the Linux operating system in glibc 2.2 to glibc 2.17
January 12, 2015
5 min ReadPayment Card Industry Data Security Standards (PCI DSS) guidelines- Often seen as just another mandatory list to be checkmarked, PCI 3.0 is here to make that change.


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™