Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Indusface

API Security Standards and Protocols: A Primer

Recent API breaches drive home the urgency of robust security. In the T-Mobile data breach, for example, the attackers exploited vulnerabilities in an API to compromise sensitive customer data. This incident exposed millions of users to potential identity theft and underscored the devastating impact of API security lapses. Infiltrating through the API, the attackers gained unauthorized access to customer records, emphasizing the need for comprehensive protection measures.

DDoS Attack Mitigation Playbook for SOC and DevOps Teams

One in two sites on AppTrana WAAP have faced a DDoS attack in the last 90 days. Most of those attacks were thwarted using a combination of machine learning on user behaviour and granular rate limits at URI, IP, and Geo levels. For SOC teams who don’t have an advanced behavioural DDoS mitigation tool like AppTrana at their disposal, this blog covers basic mitigation measures that can thwart the most simple and medium-severity DDoS attacks.

Top 5 Fastly WAF Alternatives in 2023

Fastly WAF is a hybrid SaaS solution powered by Signal Sciences. With innovative features like context-based detection through SmartParse, it significantly reduces false positives. Fastly states on its website that over 90% of its WAAP deployments are configured in a blocking mode, a unique achievement matched only by AppTrana and Imperva within the WAAP market.

B2B Firms & Compliance with The Digital Data Protection Act 2023 | Srikanth (CEO - Perfios)

Overview: In this SaaSTrana podcast, Srikanth Rajagopalan (CEO - Perfios Account Aggregation Services (P) Ltd) talks to Venky about the importance of data security for B2B (SaaS) companies and the implications imposed by the Digital Data Protection Act 2023 in case of a data breach. Furthermore, Srikanth explains how focusing on data security can benefit organizations in the long run by giving them a competitive edge and building customer trust.

What is an API Gateway? - Definition, Benefits and Limitations

An API Gateway is a mediator between the client and the collection of backend services. It accepts all API calls and routes them to one or more appropriate backend services. It doesn’t stop there; it aggregates appropriate data/ resources and delivers it to the user in a unified manner. Placed in front of the API/ group of microservices, the API gateway is the single-entry point for all API calls made to and executed by the app.

CISO Panel Discussion on Application Security

In this CISO panel discussion, join Kiran Belsekar, EVP – CISO & IT governance, Aegon Life, Manoj Srivastava, CISO, Future Generali and Ashish Tandon, Founder and CEO, Indusface. They cover a variety of topics including: Top challenges facing the office of the CISO Alert fatigue and steps to reduce it Top threat vectors faced by the insurance industry in India The rising threat of LLMs API security and best practices to secure APIs Fighting the perception battle and positioning security teams as business enablers Cutting through vendor noise and picking the right tech stack.

The Comprehensive Web Application Security Checklist [with15 Best Practices]

Over 75% of all cybercrimes primarily target web applications and their vulnerabilities. Attackers focus on exploiting weaknesses such as design flaws, vulnerabilities in APIs, open-source code, third-party widget issues, and access control problems. A recent study predicts that all this cybercrime will cost a massive $5.2 trillion by 2024 across all industries. How do you protect your web application from all the risks out there? Here is a go-to web app security checklist to get started.

DDoS Traffic Analysis Techniques for SOC Teams

A 60-minute DDoS attack could be launched with just $5 as per pricing on the Dark Web, and this was reduced from $15 in 2021. Unlike advanced attacks such as bot or zero-day attacks, these could be launched by hiring bandwidth on any of the ‘DDoS as a service’ websites. No wonder even Gartner calls out DDoS as one of the biggest threat vectors for security teams worldwide.

Web Application Penetration Testing Checklist

The proverb, “A stitch in time saves nine,” encapsulates the core of web application security. Businesses must always be one step ahead of attackers and malicious actors to identify vulnerabilities, weaknesses, and misconfigurations in web applications and ensure they are patched and/or fixed before attackers can find and leverage them to orchestrate attacks.