35 posts from June 2009

June 30, 2009

ClearPoint Metrics and Imperva announced today a collaborative effort to deliver strategic intelligence on organizations data security and compliance initiatives. This partnership allows us to integrate SecureSphere Data Security Suite with ClearPoint Metrics' Security Performance...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)
Reuters came out with an article yesterday talking about Cybercrime on Facebook. Is anybody shocked by this? You've got millions of people using a service, many of which have no idea about what not to...Read More
Share:

June 29, 2009

On this episode of the Imperva Security Podcast Paul Reymann, Co-author of the Gramm-Leach-Bliley Act (GLBA) discusses GLBA, compliance, and security within the financial industry.He also touches on financial modernization, the convergence of NIST and...Read More
Share:

June 26, 2009

In addition to the audio podcast on cyber security within industrial control system environments, SCADA, and NERC, the full transcript can be found here.Read More
Share:

June 24, 2009

In addition to the audio podcast on drive-by-downloading, the full transcript can be found here. Additionally, you can read drive-by-downloading definition.Read More
Share:

June 23, 2009

This is a continuation of multiple educational video demonstrations related to Web application attacks. This video is focused on Cookie Poisoning. The definition can be found in the Imperva ADC Glossary.As always, these videos are...Read More
Share:

June 22, 2009

I decided to write in more details about SecureSphere's "content out" integration with different systems, starting with the generic interfaces first. In Part I I wrote about Action Sets and Action Interfaces and showed how...Read More
Share:
  • Tags:
  • Permalink
  • Comments (2)
On this episode of the Imperva Security Podcast Aviram Jenik - CEO of Imperva Partner BeyondSecurity talks about bringing together WAF, VA, and Black Box Testing. Aviram discusses several very interesting application security "stories from...Read More
Share:
Time flies. Less than a year ago we predicated that the cyber-mercenary will become more common. "... Probably intrigued by quotes stating that cyberattacks are inexpensive and easy to mount, he decided to join the...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

June 18, 2009

This is the second international spicy food challenge to date. You can read about and see other Spicy Challenges here: Four, Three, Two, One. This challenge takes us to Taipei City Taiwan to eat Hot...Read More
Share: