38 posts categorized "Amichai Shulman"

August 19, 2013

A couple of weeks ago, the NSA Director, General Alexander was quoted in a Reuters article saying that in order to limit data access and potential leakage, they will cut back on 90% of NSA...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

May 09, 2013

Earlier this week, the “Moroccan Ghosts” published a list of 52 defaced Israeli sites, replacing site content with political propaganda pages (and some cool Moroccan music). Looking into the hacked domain list, we noticed that...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

April 22, 2013

The issue of sharing information for security purposes has become a hot discussion topic by both industry practitioners and legislators. The CISPA in the US and the CISP in the UK are examples of how...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

March 27, 2013

Last week, as part of the Spammer-Anti-Spammer wars - An attack on Spamhaus was created using a DNS amplification attack on highly rated DNS servers, the attack used Botnets to send an initial reflection request...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

March 19, 2013

Sharing security research and intelligence makes the community as a whole safer. By uncovering and sharing information on weaknesses in the Internet, common vulnerabilities and new attack techniques, our customers and the industry learn specific...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

February 21, 2013

Last week I attended an OWASP conference in Israel and participated in a panel about WAFEC. This panel is part of the currently ongoing effort to generate the second version of the WAF evaluation criteria...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

January 10, 2013

Imperva CTO Amichai Shulman: Let me start by saying that I’m not a big fan of back and forth argumentative discussions taking place in the blogosphere. However, the religious rage that erupted over the past...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (3)

October 29, 2012

South Carolina in the news quite a bit last week. What caused the breach? No one stated explicitly but as some may suspect, it was probably a SQL injection attack. What are the indications? First,...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

October 26, 2012

Banks have been asked to step up their DDoS protection. The request, however, is mostly CYA. Take, for example, the call to check for vulnerabilities--which has nothing to do with DDoS attacks. I think that...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

July 19, 2012

A recent article describes an apparently serious FBI investigation. The article teaches an important lesson. In this case, the FBI wasted resources on matters of relevant little importance because they can get results fast while...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)