Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Indusface

What is an API Gateway? - Definition, Benefits and Limitations

An API Gateway is a mediator between the client and the collection of backend services. It accepts all API calls and routes them to one or more appropriate backend services. It doesn’t stop there; it aggregates appropriate data/ resources and delivers it to the user in a unified manner. Placed in front of the API/ group of microservices, the API gateway is the single-entry point for all API calls made to and executed by the app.

CISO Panel Discussion on Application Security

In this CISO panel discussion, join Kiran Belsekar, EVP – CISO & IT governance, Aegon Life, Manoj Srivastava, CISO, Future Generali and Ashish Tandon, Founder and CEO, Indusface. They cover a variety of topics including: Top challenges facing the office of the CISO Alert fatigue and steps to reduce it Top threat vectors faced by the insurance industry in India The rising threat of LLMs API security and best practices to secure APIs Fighting the perception battle and positioning security teams as business enablers Cutting through vendor noise and picking the right tech stack.

The Comprehensive Web Application Security Checklist [with15 Best Practices]

Over 75% of all cybercrimes primarily target web applications and their vulnerabilities. Attackers focus on exploiting weaknesses such as design flaws, vulnerabilities in APIs, open-source code, third-party widget issues, and access control problems. A recent study predicts that all this cybercrime will cost a massive $5.2 trillion by 2024 across all industries. How do you protect your web application from all the risks out there? Here is a go-to web app security checklist to get started.

DDoS Traffic Analysis Techniques for SOC Teams

A 60-minute DDoS attack could be launched with just $5 as per pricing on the Dark Web, and this was reduced from $15 in 2021. Unlike advanced attacks such as bot or zero-day attacks, these could be launched by hiring bandwidth on any of the ‘DDoS as a service’ websites. No wonder even Gartner calls out DDoS as one of the biggest threat vectors for security teams worldwide.

Web Application Penetration Testing Checklist

The proverb, “A stitch in time saves nine,” encapsulates the core of web application security. Businesses must always be one step ahead of attackers and malicious actors to identify vulnerabilities, weaknesses, and misconfigurations in web applications and ensure they are patched and/or fixed before attackers can find and leverage them to orchestrate attacks.

How to Choose the Best Website Penetration Testing Tool?

What makes a good website penetration testing tool? Speed, agility, efficiency, or cost benefits? How about all of them? Hackers use automated tools to scan websites and apps before manually trying to exploit security loopholes. As the first step towards securing assets, you should do the same – only with better resources and before them.

Penetration Testing: A Complete Guide

Penetration testing is a pre-defined set of procedures used to identify any unknown weakness in the IT infrastructure of a business. It involves attempts to exploit vulnerabilities, which may exist in services and application flaws, operating systems, risky end-user behaviour, or improper configurations, to validate the efficacy of protection mechanisms and end-user observation of security policies.

Top F5 WAF Alternatives in 2023

F5 Cloud WAF combines signature and behaviour-based threat detection mechanisms to protect applications, regardless of the deployment location. It protects against injection attacks, session hijacking, cross-site scripting, man-in-the-middle attacks, and numerous other vulnerabilities, with continuously updated policies to shield against emerging threats.

Security Incident Management, Data Protection & Privacy Best Practices | Edgar P. (Group CISO @ YNV)

In this SaaSTrana podcast, Edgar Pimenta (Group CISO @ YNV Group) talks to Venky about the security incident management and data protection/privacy management best practices in highly regulated organizations such as telcos and financial. He also shares the steps on how orgnizations can prepare themselves in case of an incident breach and ways to recover from it quickly. Here are some key highlights from the discussion.