• All
  • Research Lab
  • Perspectives
  • Threat Central
  • Front Line
  • Subscribe: RSS | Email

    February 23, 2017

    In case you thought that big data was no longer a big deal, think again. IDC predicts continued double-digit growth for big data and business analytics through 2020. Why? Because companies are collecting more information...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 21, 2017

    Generating much interest (and concern) globally is the European Union General Data Protection Regulation (GDPR), the successor to the Data Protection Directive (95/46/EC). Enforcement is slated to begin in May 2018, and those not in...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 16, 2017

    You’ve downloaded and installed Scuba, Imperva’s free database vulnerability scanner, which provides more than 2,300 assessment tests for detecting database security vulnerabilities and configuration flaws on popular enterprise databases such as Oracle, Microsoft SQL, SAP...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 13, 2017

    The FBI deemed criminal ransomware a $1 billion industry in 2016. And the ransomware trend is expected to continue in 2017 as incentives increase and the hacking software spreads. The problem is it’s getting easier...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 08, 2017

    What is Data Masking? Also known as data anonymization or pseudonymization, data masking is used to reduce the unnecessary spread and exposure of sensitive data within an organization—protecting it while simultaneously maintaining its usability. Data...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    January 26, 2017

    Where does security sit in the IT organization? What techniques do you use to improve security awareness? How do you handle phishing and suspicious activity from insiders and contractors? Imperva CISO, Shahar Ben Hador, answered...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
  • Look here for our latest research reports and breaking security news.

    Subscribe: RSS | Email

    January 19, 2017

    In a previous Imperva Hacker Intelligence Initiative (HII) report we delved into some of the financial aspects of phishing and credential theft. Obviously, one of the important factors in the cost of a campaign is...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    January 17, 2017

    On December 25th 2016, a critical new vulnerability in PHPMailer was made public. The open source PHP library for email handling embeds email functionality in web applications. This recent vulnerability takes advantage of insufficient validation...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    January 05, 2017

    Since 2010, 68 vulnerabilities of Apache Struts—the popular open source framework used for building web applications—have been published. Although all of them have been mitigated through patches, hackers still constantly exploit these vulnerabilities to launch...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 29, 2016

    Part of our job on the Imperva web application security team is supplying inclusive mitigation to new security vulnerabilities in web applications as soon as they become public. Imperva continually gathers information regarding new vulnerabilities...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • You'll find thoughts on security trends, industry news, and upcoming Imperva events here.

    Subscribe: RSS | Email

    December 27, 2016

    Here at Imperva, we’ve seen a lot in our more than 14 years in the cyber security industry and 2016 was no exception. Data breach after DDoS attack after insider threat…hackers upped their game with...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 20, 2016

    At the end of 2015 we offered several predictions regarding the evolving cyber security landscape for 2016. We’ll be releasing our 2017 predictions soon, but before we do, we thought we’d see how accurate our...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 14, 2016

    As the Chief Information Security Officer (CISO) of Imperva, I head up the team that is responsible for security and compliance across the enterprise footprint and cloud operations activities for the company and its SaaS...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    November 03, 2016

    Financial institutions and e-commerce merchants have become targets of massive financial fraud as cyber criminals have used stolen payment card data from major data breaches1, such as the ones involving Wendy’s restaurants in 2015, Home...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Find practical information on late-breaking security threats here.

    Subscribe: RSS | Email

    November 14, 2016

    Joomla! CVE-2016-8870 & CVE-2016-8869 This blog analyzes the privilege escalation vulnerability in Joomla! CMS and its exploitation in the wild. Based on the attack traffic, we show the statistics of the attack including a spike...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 24, 2016

    On Friday Oct. 21, 2016, a DDoS attack shut down several popular internet sites. Users experienced slow access or no service to Twitter, Spotify, Shopify, SoundCloud, Reddit and The New York Times and others. The...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    August 30, 2016

    In the Imperva Incapsula DDoS Threat Landscape Report, we share detailed information about the latest attack trends, using data collected in the course of mitigating thousands of DDoS assaults against Imperva Incapsula customers. Leveraging this...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    August 03, 2016

    It was November 2015 when I heard the high-pitched excitement of a researcher from our Imperva Defense Center – “HTTP/2 is susceptible to slow read attacks!” It was like déjà vu all over again; five...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Here's our central location for helpful advice, tips, how-to information, and best practices.

    Subscribe: RSS | Email

    November 03, 2016

    Financial institutions and e-commerce merchants have become targets of massive financial fraud as cyber criminals have used stolen payment card data from major data breaches1, such as the ones involving Wendy’s restaurants in 2015, Home...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 27, 2016

    “Do you have any insect repellent? I’ve been told my computer has a bug.” There is no doubting that cyber security is a very technical subject, and with the current state of hacking for profit...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    October 24, 2016

    On Friday Oct. 21, 2016, a DDoS attack shut down several popular internet sites. Users experienced slow access or no service to Twitter, Spotify, Shopify, SoundCloud, Reddit and The New York Times and others. The...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Health care organizations are at the forefront of cyber security. Arguably, they’re ahead of many other industries because they’re a top target for cyber criminals. A single patient record is worth 10 times more than...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »