69 posts categorized "Barry Shteiman"

February 12, 2015

Having lived in Europe for the majority of my life, and in the US for the recent few years, I have been exposed to sports audiences of both Soccer and Football. Somehow I always find...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

February 05, 2015

I have been taking part in several conversations lately that evolve around data audit in different scopes, looking into patterns and especially at the value of auditing certain data types vs. others in order to...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

January 14, 2015

Imperva has been in the business of protecting the high-value applications and data assets at the heart of the enterprise since 2002. In the years since, we’ve gained tremendous knowledge about cyber security and the...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

December 09, 2014

Nothing gets me into the holiday spirit like a nice number crunching exercise. This is especially true after our previous blog, where we looked at last year’s holiday season attacks. To have a better understanding...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

November 25, 2014

In September, a bug in GNU Bash was publicly exposed in the wild and rained fire on computer systems on premise and in the cloud due to the simple attack vector and the effect on...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

November 24, 2014

The holiday season is approaching so we thought it would be a good time to check whether cybercriminals shop as well… The holiday season encompasses two major sales events: the old Black Friday and his...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

October 09, 2014

Today, we are proud to release the 5th installment of our annual Web Application Attack Report. For those of you new to this report, Imperva’s Web Application Attack Report (WAAR) is a thorough analysis of...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

October 02, 2014

Following my previous post on SSJI (Server Side JavaScript Injection), I received many questions requesting more details and techniques on how applications that use a big data back end may be vulnerable and If I...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

September 24, 2014

Websites that contain personal information of users, such as login details and other data, are frequently targeted by hackers. Personal data is highly valuable in the black market for fraud purposes, theft, and other nefarious...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)

September 04, 2014

Big Data Server Side JavaScript Injection In Part #2 of this blog series, Mark Kraynak covered some of the application security risks that reside in Big Data implementations, and in follow-up, I’d like to address...Read More
Share:
Share on LinkedIn
  • Authors & Topics:
  • Permalink
  • Comments (0)