60 posts categorized "Barry Shteiman"

September 04, 2014

Big Data Server Side JavaScript Injection In Part #2 of this blog series, Mark Kraynak covered some of the application security risks that reside in Big Data implementations, and in follow-up, I’d like to address...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

August 20, 2014

Ahhh Vegas. Where things happen and stay, right? If you remember, we ran an exercise during the soccer world cup and we correlated final game matches to attack information. We had so much positive feedback...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

August 04, 2014

As tradition dictates, Imperva will be attending BlackHat 2014 in Las Vegas this week. We are coming with an extended staff this year giving room to our cloud companies – Incapsula and SkyFence. Amongst this...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

July 15, 2014

While most sports fans followed World Cup matches and results anxiously, some of us number geeks decided to add another dimension of analytics to this beautiful game. We wanted to have some fun with the...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

July 01, 2014

Earlier today, Forbes published an article which includes my take on how companies should behave after a data breach, especially on the customer communications front, to make sure that they maintain customer loyalty and trust....Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

June 24, 2014

Not often we get a chance to easily demonstrate the correlation between malware hitting personal devices and data center security. Last month we stumbled upon such priceless opportunity during a customer PoC. What happened to...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

June 08, 2014

Comment spam is a growing field for spammers seeking to generate revenue from injecting spam commentary into interactive websites that allow user content to be displayed (such as forums and comment boards). Spammers seek to...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

June 06, 2014

Ever since the Heartbleed vulnerability was exposed last month, there has been an increased level of scrutiny on this highly used, open-source protocol implementation. What is it? On June 5th, 2014 OpenSSL released a fix...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

May 23, 2014

A couple of weeks back, we took a snapshot from our crowd sourced threat intelligence system, Community Defense, looking at the velocity of application attacks. For the sake of this blog, I will focus on...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)

May 20, 2014

Recently, we analyzed the top 10 Web vulnerabilities throughout April 2014, which have been used by many attack campaigns in order to break into Web applications around the world. We gathered that data via our...Read More
Share:
  • Tags:
  • Permalink
  • Comments (0)