• All
  • Research Lab
  • Perspectives
  • Threat Central
  • Front Line
  • Subscribe: RSS | Email

    May 28, 2015

    A few days ago I read an interesting post. In this post the author explains how he was able to build a list of subdirectories to brute force web servers and find hidden resources, relying...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 27, 2015

    Imperva will be participating in Europe’s number one information security event – the InfoSecurity Europe Conference, June 02 - 04 in London. I hope you will stop by our stand—#C20—and talk with Imperva security experts...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 22, 2015

    Here in Imperva we constantly monitor and analyze malicious activity targeted at our customers’ web servers. We use our own designated analysis system to detect new trends in this activity, and better protect against them....Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 21, 2015

    Using signature-based or simple logic protections alone are no longer sufficient security measures in today’s threat landscape. Dropping traffic on a port at the firewall is not enough to keep these threats out of the...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 14, 2015

    A post this week on Jordan Wright’s blog has generated quite a bit of discussion here at Imperva on the subject of industrial hacking. Jordan talks about a large number of attempts (at least one...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    The automatic synchronization (auto-sync) feature between unmanaged devices and cloud apps like Office 365 and Box has a potential downside: loss of sensitive corporate information. Check out the Imperva Skyfence blog for more information.Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
  • Look here for our latest research reports and breaking security news.

    Subscribe: RSS | Email

    May 28, 2015

    A few days ago I read an interesting post. In this post the author explains how he was able to build a list of subdirectories to brute force web servers and find hidden resources, relying...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 22, 2015

    Here in Imperva we constantly monitor and analyze malicious activity targeted at our customers’ web servers. We use our own designated analysis system to detect new trends in this activity, and better protect against them....Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 28, 2015

    A recent attempt to intercept Tor traffic has once again highlighted the challenges involved in trying to remain anonymous in a world full of well-resourced adversaries with a vested interest in matching your online activities...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 12, 2015

    Having lived in Europe for the majority of my life, and in the US for the recent few years, I have been exposed to sports audiences of both Soccer and Football. Somehow I always find...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • You'll find thoughts on security trends, industry news, and upcoming Imperva events here.

    Subscribe: RSS | Email

    May 27, 2015

    Imperva will be participating in Europe’s number one information security event – the InfoSecurity Europe Conference, June 02 - 04 in London. I hope you will stop by our stand—#C20—and talk with Imperva security experts...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 21, 2015

    Using signature-based or simple logic protections alone are no longer sufficient security measures in today’s threat landscape. Dropping traffic on a port at the firewall is not enough to keep these threats out of the...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 07, 2015

    In my last post, I covered the first step in going beyond the boundaries of traditional security to discover your assets and risks. I provided an overview of the superior products Imperva offers and outlined...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 21, 2015

    Digging through the Verizon 2015 Data Breach Investigations Report (DBIR) could be a long (while fun) task. Going through all of the different threats, victims, demographics and stolen records raises a lot of questions for...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Find practical information on late-breaking security threats here.

    Subscribe: RSS | Email

    April 17, 2015

    On Tuesday, April 14, 2015, Microsoft published Security Bulletin MS15-034 (also known as CVE-2015-1635), an HTTP.sys vulnerability that puts users with certain versions of Windows and IIS at risk. Microsoft also issued a patch as...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    November 18, 2014

    There’s an elephant in the room when it comes to big data, and I’m not just talking about the one in the Apache Hadoop logo. But, we’ll get back to that. First a little context....Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 06, 2010

    Imperva has announced Incapsula. The cloud-based, web application firewall service gives small businesses an easy and affordable way to manage website security and performance for any domain that they own, even if it's hosted by...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 21, 2009

    Few more days and the year 2009 will be behind us. The technology fans are now into movies due to James Cameron's recent masterpiece. As geeks and movie fans (including yours truly) are raving The...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Here's our central location for helpful advice, tips, how-to information, and best practices.

    Subscribe: RSS | Email

    May 14, 2015

    A post this week on Jordan Wright’s blog has generated quite a bit of discussion here at Imperva on the subject of industrial hacking. Jordan talks about a large number of attempts (at least one...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    The automatic synchronization (auto-sync) feature between unmanaged devices and cloud apps like Office 365 and Box has a potential downside: loss of sensitive corporate information. Check out the Imperva Skyfence blog for more information.Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 13, 2015

    Several dozen Imperva Incapsula customers were recently targeted by a DDoS botnet comprised of tens of thousands of hijacked routers. After informing the major companies involved, we are sharing attack details in an attempt to...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 11, 2015

    To be successful in the cloud, IT organizations should abandon their ‘Engineering’ mentality and embrace a ‘Cloud’ mentality. I've worked with quite a few companies that struggle with this change in mindset and as a...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »