63 posts categorized "Barry Shteiman"

October 09, 2014

Today, we are proud to release the 5th installment of our annual Web Application Attack Report. For those of you new to this report, Imperva’s Web Application Attack Report (WAAR) is a thorough analysis of...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

October 02, 2014

Following my previous post on SSJI (Server Side JavaScript Injection), I received many questions requesting more details and techniques on how applications that use a big data back end may be vulnerable and If I...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

September 24, 2014

Websites that contain personal information of users, such as login details and other data, are frequently targeted by hackers. Personal data is highly valuable in the black market for fraud purposes, theft, and other nefarious...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

September 04, 2014

Big Data Server Side JavaScript Injection In Part #2 of this blog series, Mark Kraynak covered some of the application security risks that reside in Big Data implementations, and in follow-up, I’d like to address...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

August 20, 2014

Ahhh Vegas. Where things happen and stay, right? If you remember, we ran an exercise during the soccer world cup and we correlated final game matches to attack information. We had so much positive feedback...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

August 04, 2014

As tradition dictates, Imperva will be attending BlackHat 2014 in Las Vegas this week. We are coming with an extended staff this year giving room to our cloud companies – Incapsula and SkyFence. Amongst this...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

July 15, 2014

While most sports fans followed World Cup matches and results anxiously, some of us number geeks decided to add another dimension of analytics to this beautiful game. We wanted to have some fun with the...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

July 01, 2014

Earlier today, Forbes published an article which includes my take on how companies should behave after a data breach, especially on the customer communications front, to make sure that they maintain customer loyalty and trust....Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

June 24, 2014

Not often we get a chance to easily demonstrate the correlation between malware hitting personal devices and data center security. Last month we stumbled upon such priceless opportunity during a customer PoC. What happened to...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

June 08, 2014

Comment spam is a growing field for spammers seeking to generate revenue from injecting spam commentary into interactive websites that allow user content to be displayed (such as forums and comment boards). Spammers seek to...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)