25 posts categorized "Mark Kraynak"

February 13, 2015

With the White House Summit on Cybersecurity and Consumer Protection happening just down the road from Imperva headquarters today, I thought I’d share a few more comments on some of the proposals that are front...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

February 10, 2015

This morning, Imperva announced some important new capabilities in the Imperva Skyfence product line. Frank Cabri has outlined these in depth in the Skyfence product blog. The use case that I find most compelling is...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

February 06, 2015

Perspectives on the Anthem breach: 1. The sad fact is that health information has become one of the most valuable assets to the hacker community the reason, I think, is that it's comprehensive enough to...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

January 28, 2015

Yesterday, Qualys researchers made public a buffer overflow vulnerability in a component of the glibc library. At this time, there is no known exploitation vector for most popular applications (http://seclists.org/oss-sec/2015/q1/283). Further, there is a very...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

January 15, 2015

On Tuesday, the White House announced a proposal for new legislation and other efforts around cyber security. I want to focus on the legislation. It has 3 parts: 1) Enabling Cybersecurity Information Sharing 2) Modernizing...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

January 14, 2015

Imperva has been in the business of protecting the high-value applications and data assets at the heart of the enterprise since 2002. In the years since, we’ve gained tremendous knowledge about cyber security and the...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

November 11, 2014

In July, I wrote about how Imperva’s SecureSphere, Incapsula and Skyfence offerings combine to provide a comprehensive security approach for applications in Amazon Web Services (AWS). I also said there was “more to come” from...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

November 04, 2014

Driven by compliance, auditing database activity has become a daily burden to most IT departments. At Imperva, we’ve found that over half of the organizations doing database audit are using tools embedded in their databases...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

October 15, 2014

Google researchers recently uncovered a security bug (CVE-2014-3566) that they say could allow hackers to steal data. This vulnerability is a Man-In-The-Middle (MITM) attack which means a client-to-server session is being hijacked and then used...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)

September 30, 2014

Today, NSS Labs published one of its Comparative Analysis Reports on Web Application Firewalls. The publishing of this report will likely prompt glowing press releases from other vendors, each one citing the “security effectiveness” and...Read More
Share:
Share on LinkedIn
  • Authors:
  • Permalink
  • Comments (0)