19 posts categorized "Mark Kraynak"

November 11, 2014

In July, I wrote about how Imperva’s SecureSphere, Incapsula and Skyfence offerings combine to provide a comprehensive security approach for applications in Amazon Web Services (AWS). I also said there was “more to come” from...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

November 04, 2014

Driven by compliance, auditing database activity has become a daily burden to most IT departments. At Imperva, we’ve found that over half of the organizations doing database audit are using tools embedded in their databases...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

October 15, 2014

Google researchers recently uncovered a security bug (CVE-2014-3566) that they say could allow hackers to steal data. This vulnerability is a Man-In-The-Middle (MITM) attack which means a client-to-server session is being hijacked and then used...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

September 30, 2014

Today, NSS Labs published one of its Comparative Analysis Reports on Web Application Firewalls. The publishing of this report will likely prompt glowing press releases from other vendors, each one citing the “security effectiveness” and...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)
Last month I wrote two articles about opportunity cost. But recently I got to thinking about an opportunity some long time Imperva customers are missing. In short, it’s turning on Community Defense, the crowdsourced threat...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

September 25, 2014

A new, widespread internet vulnerability has been found. Dubbed “Shellshock,” it affects Linux servers using GNU Bash, which is in very widespread use. The vulnerability allows injection of arbitrary commands at higher privilege (i.e. privilege...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

September 24, 2014

Mike Rothman wrote about the post facto analysis game on the Securosis blog today (“Hindsight FTW”). And I think he got it right. In a nutshell, it’s easy to say now that Home Depot should...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

September 22, 2014

Late last week, there was an article in the Huff Post titled “The Big Lie Behind the Biggest Data Breaches” that prompted a great back-and-forth discussion Inside Imperva. The issue under debate is: Do companies...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

August 27, 2014

Earlier in the week, I wrote about the opportunity cost changing the status quo for database auditing. Today, I’m writing about a different opportunity cost, this time for SaaS security. In the tradition of Scuba...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)

August 25, 2014

One of the most compelling arguments for a software vendor looking for customers is that by automating or streamlining a business process, the customer can save significant amounts of money. One of the most frustrating...Read More
Share:
Share on LinkedIn
  • Tags:
  • Permalink
  • Comments (0)