November 5, 2014
3 min ReadBiggest Security Risk – “Data Breach Fatigue”
Data Breach Fatigue: The Biggest Security Risk. Learn how it affects you & your business. Tips to avoid it. Read more now
Upcoming Webinar : Protecting APIs at Scale with API Discovery and Classification Register now!
November 5, 2014
3 min ReadData Breach Fatigue: The Biggest Security Risk. Learn how it affects you & your business. Tips to avoid it. Read more now
October 30, 2014
3 min ReadThere have been several atrocious security vulnerabilities announced in the last few months, with “Heartbleed” in web servers and Shellshock in shell command lines. There are too many questions in the.
October 15, 2014
3 min ReadToday, Google announced a POODLE vulnerability in the implementation of the SSL 3.0 protocol potentially compromising secure connections online. Know more
October 9, 2014
2 min Read800K bank transactions were sniffed in a massive botnet attack. Keep your finances secure by staying vigilant online.
October 7, 2014
3 min ReadThe web has evolved and has changed from providing only static experience to an interactive and dynamic platform which is being used today by all major businesses and organizations to.
September 25, 2014
3 min ReadA major vulnerability in the Bourne Shell — called bash shell – has come to the fore. This vulnerability existed from a long time.
September 23, 2014
3 min ReadAs per a latest report, Cybercriminals have exploited the power of two online advertising networks, Google’s DoubleClick and popular Zedo advertising agency.
September 22, 2014
6 min ReadBy Indusface Research Team As per some reports, Gmail has been hacked and 5 million user names and passwords were stolen from compromised accounts. What does this mean for you?.
September 10, 2014
5 min ReadHollywood stars are all over the internet, and not because of Emmys, but because some nut job stole their nude photos and leaked them online. From cloud…nope, iCloud! I can.
September 8, 2014
5 min ReadDiscover the essence of Big Data and essential tips for safeguarding your valuable information in this comprehensive guide.
September 2, 2014
4 min ReadThe use of 3rd party frameworks and libraries in application development has become a very common practice but unfortunately most of the time, proper security policies aren’t implemented to mitigate the.


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™