• All
  • Research Lab
  • Perspectives
  • Threat Central
  • Front Line
  • Subscribe: RSS | Email

    April 15, 2016

    As if tax season wasn’t stressful enough, Krebs on Security is reporting unprecedented tax fraud this year. As a result, the IRS is taking up to three times longer to review 2015 tax returns compared...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 14, 2016

    In the previous blog, Amichai laid the foundation for today’s biggest threat to enterprise data – insider threats. In this discussion, he discusses the missing pieces that are needed to tackle threats from within. Q:...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 11, 2016

    Databases Activity Monitoring (DAM) tools have become widely used by companies that want to provide an added layer of security and protection against malicious attacks. More pointedly, database monitoring tools are critical to meet legal...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 09, 2016

    Carrie McDaniel, lead on our newly announced Imperva CounterBreach product line, and I had the privilege of talking to our dynamic CTO/Co-founder Amichai Shulman on the topic of data breaches in the context of insider...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 08, 2016

    Databases are the heart of every enterprise, and their secrets are the treasure of any hacker. Extracting data by bad actors is a risk that most enterprises face. With the evolution of databases and emergence...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 07, 2016

    How safe is your data center? If the average budget allocation is any indication, the prognosis isn’t good. According to the International Data Corporation (IDC), out of $27 billion cumulative worldwide spending on security products,...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 06, 2016

    You hear about it all the time on TV news, print magazines, and online articles … a new breach, a new attack, a new threat, a new vulnerability. However, did you know that over 97...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 05, 2016

    A recent article on CNBC showed that 40% of corporate executives surveyed feel they’re not responsible for cybersecurity. It referred to a survey conducted by endpoint company Tanium that noted: “More than 90 percent of...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 04, 2016

    The “long arm of the law” may be delayed in serving justice, but it did round up counterfeit scammers like www.montblancoutlet.com. Imperva ThreatRadar Community Defense was ahead of the game in detecting such spammers that...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 01, 2016

    Passwords, they’re pretty much a headache for everyone involved. It’s a pain to come up with strong passwords and even harder to remember them, and it’s challenging for companies to enforce password rules for their...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
  • Look here for our latest research reports and breaking security news.

    Subscribe: RSS | Email

    April 25, 2016

    In our recent research report, we followed the infection chain and operation of CryptoWall 3.0 ransomware, focusing on payments made by victims and how those payments eventually aggregate to a small number of Bitcoin wallets...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 04, 2016

    The “long arm of the law” may be delayed in serving justice, but it did round up counterfeit scammers like www.montblancoutlet.com. Imperva ThreatRadar Community Defense was ahead of the game in detecting such spammers that...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    March 26, 2016

    Three months after the previous report we thought it is a good opportunity to check in on the CVEs registered by Imperva SecureSphere Web Application Firewalls. We found some interesting trends – highlighting the most...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    March 25, 2016

    2015 was the sixth year in a row that we released our Web Application Attack Report, known affectionately here at Imperva as WAAR. Each year we find new threats, continuing trends, and a deeper understanding...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • You'll find thoughts on security trends, industry news, and upcoming Imperva events here.

    Subscribe: RSS | Email

    May 06, 2016

    Web applications attacks are the #1 source of data breaches for the year 2015 - Verizon DBIR 2016. Hackers exploit the weakest links – users/humans and applications – to get to your enterprise data. Humans...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 03, 2016

    I’d like to introduce Lior Fisch, our resident expert on everything machine learning. A few people I know are as knowledgeable as Lior and have so much fun working on big data. He applies his...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 27, 2016

    According to the Verizon 2016 Data Breach Investigations Report (DBIR), “Web application attacks climbed to the #1 spot for data breaches.” This finding is worth repeating, Web applications are the #1 source for data breaches,...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 23, 2016

    Steve Durbin, Managing Director at the Information Security Forum (ISF) believes that defending against insiders is "always a matter of trust." He also reportedly said that negligent and accidental insiders pose a larger security risk...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Find practical information on late-breaking security threats here.

    Subscribe: RSS | Email

    April 25, 2016

    In our recent research report, we followed the infection chain and operation of CryptoWall 3.0 ransomware, focusing on payments made by victims and how those payments eventually aggregate to a small number of Bitcoin wallets...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 04, 2016

    The “long arm of the law” may be delayed in serving justice, but it did round up counterfeit scammers like www.montblancoutlet.com. Imperva ThreatRadar Community Defense was ahead of the game in detecting such spammers that...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    March 26, 2016

    Three months after the previous report we thought it is a good opportunity to check in on the CVEs registered by Imperva SecureSphere Web Application Firewalls. We found some interesting trends – highlighting the most...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 22, 2016

    When you hear about the recent devastating attacks involving smartphones, malware infection of Android/iOS comes naturally to your mind. However, once you take a closer look at these mobile security incidents, you will be surprised...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Here's our central location for helpful advice, tips, how-to information, and best practices.

    Subscribe: RSS | Email

    February 28, 2016

    Increasingly, Cloud Access Security Brokers (CASB) are being used by IT to align with their cloud strategies well beyond app discovery and risk assessment of unauthorized apps. Organizations are getting more value from CASBs by...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 26, 2016

    External cybersecurity threats get all the press, and they are certainly dangerous. Shadowy international gangsters, brilliant but evil hackers, mom-and-pop-shop criminals stealing from us one Target transaction at a time – as fictional as it...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 24, 2016

    Imperva is going to put on one heck of a show at the RSA conference this year. I’ve put together this list of the five things you won’t want to miss. Hear about the leading...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    It shouldn’t surprise anyone that more organizations were victims of a successful cyber-attack in 2015. More than half (62%) of respondents expect their organization to be compromised by a successful cyber- attack in 2016, up...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »