Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2023

Cloudflare vs. Azure WAF

Cloudflare WAF protects against web-based attacks and malicious traffic using customizable rule sets. Cloudflare’s network extends across numerous data centers worldwide, ensuring efficient content delivery and robust DDoS protection. Moreover, Cloudflare provides supplementary functionalities such as CDN caching, SSL/TLS encryption, and DNS management to enhance overall web performance and security.

Live DDoS Attack Simulation on Websites & APIs

DDoS attacks have increased by 75% in Q2 when compared to Q1, 2023 as per Indusface research – State of Application Security. Launching a 1-hour DDoS attack costs only a couple of bucks on the dark web. So, how does one fortify defenses to ensure app and API availability in case of an attack? In this live attack simulation, Karthik Krishnamoorthy (CTO - Indusface) demonstrates a wide variety of attacks and mitigation measures.

Building North Star Metrics for Security Teams | Mona Salvi (Senior Director, HubSpot)

Here are some highlights of the conversation between Mona Salvi (Senior Director - Product Security, HubSpot) and Venky (Founder, Indusface). She talks to Venky about building a unified organization structure and North Star metrics to drive security-related initiatives in a cohesive working environment. She also shares how to manage three pillars - platform security + trust & safety + payments fraud together under a single leadership umbrella.

Protecting from Threats Caused by OpenAI and LLM Tools | Mona Salvi (Senior Director, HubSpot)

Here are some highlights of the conversation between Mona Salvi (Senior Director - Product Security, HubSpot) and Venky (Founder, Indusface). She talks to Venky about building a unified organization structure and North Star metrics to drive security-related initiatives in a cohesive working environment. She also shares how to manage three pillars - platform security + trust & safety + payments fraud together under a single leadership umbrella.

What is an Authenticated Security Scan, And Why Is It Important?

Many organizations today rely only on “unauthenticated” web application security scans, leaving their admin and user portals unchecked. While it is crucial to protect your system against external automated attacks, you shouldn’t ignore the possibility of a targeted attack from someone with valid logins. If your app lets anyone signup online, it could easily expose your business to attackers.

Fundamentals of Origin Server Protection

Servers host applications and services; therefore, they are the center of all web, mobile, and API applications. These origin servers are under constant attack as hackers run probes to exploit open vulnerabilities and launch large-scale DDoS attacks that could bring down the entire infrastructure. Therefore, ensuring availability and protecting the integrity of origin servers is paramount. This article will cover what, why, and how of origin protection.

Breaking Silos in Platform Security, Trust & Safety, and Risk - Mona Salvi (Sr. Director, HubSpot)

Overview: In this SaaSTrana podcast, Mona Salvi (Senior Director - Product Security, HubSpot) talks to Venky about building a unified org structure and North Star metrics to drive security-related initiatives in a cohesive working environment. She also shares how to manage three pillars - platform security + trust & safety + payments fraud together under a single leadership umbrella. Here are some key highlights from the discussion.

Akamai Vs. Cloudflare WAF

Akamai, a pioneering WAF solution, retains its key position within the evolving WAAP landscape. As one of the earliest players in the CDN space, Akamai maintains its dominance in content delivery. Akamai’s App & API Protector combines a range of leading-edge technologies, including web application firewall, bot mitigation, API security, and DDoS protection, all within a user-friendly, unified solution.

Attributes and Types of Security Testing

Security testing aims to find vulnerabilities and security weaknesses in the software/ application. By subjecting the software or application to controlled security scenarios, security testing ensures that the system is adequately prepared to withstand attacks and unforeseen failures. Security experts and testers use different types of security testing to identify potential threats, measure the probability of exploitation of vulnerabilities, and gauge the overall risks facing the software/ app.

Discover Hidden Assets with AppTrana WAAP

We are excited to introduce Asset Discovery – a new feature that allows you to find and protect unknown applications, domains, sub-domains, and other public assets. This feature is now part of AppTrana WAAP and Indusface WAS (Web Application Scanning). Unknown is the biggest risk, especially when it is an orphaned app that was launched by one of your business divisions that is no longer in use.