Web Application Firewall

Everything Startups Need to Know About CyberSecurity

Everything Startups Need to Know About CyberSecurity

Keeping your startup safe from hackers, data loss and breaches takes more than just a firewall and antivirus software. Here… Read More

7 years ago

46 Ways to Stop Ecommerce Security Threats

Anyone can get hacked. Lucky the tools are out there. Analyze your most pressing needs, and then get the right… Read More

7 years ago

Apache Struts Under Attack- Indusface Securing Customers from Day Zero

A remote code execution flaw was discovered in the widely-used Apache Struts 2 framework. Attackers continue to exploit vulnerable (unpatched)… Read More

7 years ago

DDoS Attack Protection Online on Websites

When anyone can hire machines with advanced processing powers, how difficult you think it is to launch application level distributed… Read More

8 years ago

31 Google URLs Vulnerable to Open Redirect

Do you remember the last time we discussed OWASP A10- Invalidated Redirects and Forwards? It was our OWASP educative series… Read More

8 years ago

What Is the Cost of Web Application Security?

Is SaaS application security the next level of data security? Find out how it stands against in-house security in terms… Read More

9 years ago

XSS Examples and Prevention Tips

Cross-Site Scripting is most common web application vulnerability posing threat to around 65% of all websites. Take a look at… Read More

9 years ago

NGFWs vs WAF [Guide]

How many types of firewalls are there? Is a single firewall enough to all your problems? Find out answers to… Read More

9 years ago

Hey Experts, Is Application Security your Stepchild?

The web has evolved and has changed from providing only static experience to an interactive and dynamic platform which is… Read More

10 years ago

After iCloud massacre, it’s time to re-visit the tips to secure your data on Cloud

Hollywood stars are all over the internet, and not because of Emmys, but because some nut job stole their nude… Read More

10 years ago

OWASP A9 Using Components with Known Vulnerabilities

The use of 3rd party frameworks and libraries in application development has become a very common practice but unfortunately most of… Read More

10 years ago

7 Habits of Highly Effective WAFs (Web Application Firewalls)

WAF have been a critical part of securing external facing websites for years now. Here are 7 best habits for… Read More

10 years ago

WAF Signatures

SQL injection is one of the deadliest because it has the potential of retrieving the whole database from the web… Read More

10 years ago