July 25, 2014
3 min ReadAre CISOs Becoming the Soft Target?
The CISOs are trying their level best to cope with the rising and unique nature of cyber threats. In the present times, each and every CISO conscious of their organization’s.
Fireside Chat : Managed Security in Action - Operational Realities for CISOs - Register Now !
July 25, 2014
3 min ReadThe CISOs are trying their level best to cope with the rising and unique nature of cyber threats. In the present times, each and every CISO conscious of their organization’s.
July 24, 2014
3 min ReadWAF have been a critical part of securing external facing websites for years now. Here are 7 best habits for highly effective WAF.
July 22, 2014
2 min ReadGameover Zeus first appeared in September 2011. FBI had held Gameover Zeus botnet responsible for the theft of more than $100 mn, since then.
July 16, 2014
3 min ReadThe rising trend in cyber-crimes against Indian establishments has urged the Government to toughen its stand. The Centre has ordered security auditing of the entire IT infrastructure of the central.
July 11, 2014
4 min ReadAttackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes using sensitive data exposure.
July 7, 2014
3 min ReadAccording to the recent actions of technology heavy weight Microsoft, if a company operates insecure infrastructure, that is repeatedly used to spread malicious software, they could seize the underlying assets..
July 4, 2014
3 min Read90% of the top mobile banking apps have been found to have serious security flaws. Securing your mobile applications is not an option anymore, but a necessity.
July 3, 2014
3 min ReadCross Site Request Forgery forces an end user to execute unwanted actions on a web application in which he is currently authenticated.
June 27, 2014
3 min ReadDDoS attacks have rapidly become hacker’s choice of attack, with evidently many major businesses falling at the receiving end.
June 12, 2014
3 min ReadTweetDeck, the popular social media dashboard application for management of Twitter accounts, had to be temporarily shut down today, after being found vulnerable to cross-site scripting (XSS). The incident occurred reportedly.
June 12, 2014
3 min ReadIndusface’s Customer – Victim of Application DDoS: Have you ever experienced a live DDoS attack on your website? It’s totally eerie knowing that someone or something out in the under.
June 6, 2014
2 min ReadWithin weeks of the infamous Heartbleed vulnerability in one of the world’s most commonly used open-source software OpenSSL, more vulnerabilities have been found in OpenSSL. One of the reasons for.


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™