• All
  • Research Lab
  • Perspectives
  • Threat Central
  • Front Line
  • Subscribe: RSS | Email

    May 07, 2015

    In my last post, I covered the first step in going beyond the boundaries of traditional security to discover your assets and risks. I provided an overview of the superior products Imperva offers and outlined...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 28, 2015

    A recent attempt to intercept Tor traffic has once again highlighted the challenges involved in trying to remain anonymous in a world full of well-resourced adversaries with a vested interest in matching your online activities...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 21, 2015

    Digging through the Verizon 2015 Data Breach Investigations Report (DBIR) could be a long (while fun) task. Going through all of the different threats, victims, demographics and stolen records raises a lot of questions for...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 17, 2015

    On Tuesday, April 14, 2015, Microsoft published Security Bulletin MS15-034 (also known as CVE-2015-1635), an HTTP.sys vulnerability that puts users with certain versions of Windows and IIS at risk. Microsoft also issued a patch as...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Imperva Skyfence weighs in on the importance of multi-factor authentication in protecting against the misuse of stolen user credentials in the cloud. Check out the product blog for more information.Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 16, 2015

    A couple of weeks ago, I stated here that traditional security alone is not enough to protect your business-critical data and apps from cyber-attacks and internal threats. I suggested that while you still want to...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 15, 2015

    On the political front, there’s been a lot of talk lately about income inequality and the wide gap between the 1% and the 99%. I try to stay away from politics, but this week’s release...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 14, 2015

    Payment Card Industry Data Security Standard (PCI DSS) version 3.0 was released in November 2013 and partially took effect Jan. 1st, 2015. Several sub-requirements were added, but the 12 primary requirements remained the same. Thanks...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 13, 2015

    The tee shirt we are distributing at RSA says it all: Life’s a Breach. Anyone associated with the cyber security world knows this all too well. You’ve read the headlines—major healthcare sites are hacked, entertainment...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 09, 2015

    Imperva product line Incapsula announced three new enterprise-grade features that help customers integrate Incapsula protection solutions into existing enterprise workflows. Check out the product blog for more information.Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
  • Look here for our latest research reports and breaking security news.

    Subscribe: RSS | Email

    May 22, 2015

    Here in Imperva we constantly monitor and analyze malicious activity targeted at our customers’ web servers. We use our own designated analysis system to detect new trends in this activity, and better protect against them....Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 28, 2015

    A recent attempt to intercept Tor traffic has once again highlighted the challenges involved in trying to remain anonymous in a world full of well-resourced adversaries with a vested interest in matching your online activities...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 12, 2015

    Having lived in Europe for the majority of my life, and in the US for the recent few years, I have been exposed to sports audiences of both Soccer and Football. Somehow I always find...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 05, 2015

    I have been taking part in several conversations lately that evolve around data audit in different scopes, looking into patterns and especially at the value of auditing certain data types vs. others in order to...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • You'll find thoughts on security trends, industry news, and upcoming Imperva events here.

    Subscribe: RSS | Email

    May 21, 2015

    Using signature-based or simple logic protections alone are no longer sufficient security measures in today’s threat landscape. Dropping traffic on a port at the firewall is not enough to keep these threats out of the...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 07, 2015

    In my last post, I covered the first step in going beyond the boundaries of traditional security to discover your assets and risks. I provided an overview of the superior products Imperva offers and outlined...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 21, 2015

    Digging through the Verizon 2015 Data Breach Investigations Report (DBIR) could be a long (while fun) task. Going through all of the different threats, victims, demographics and stolen records raises a lot of questions for...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    April 16, 2015

    A couple of weeks ago, I stated here that traditional security alone is not enough to protect your business-critical data and apps from cyber-attacks and internal threats. I suggested that while you still want to...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Find practical information on late-breaking security threats here.

    Subscribe: RSS | Email

    April 17, 2015

    On Tuesday, April 14, 2015, Microsoft published Security Bulletin MS15-034 (also known as CVE-2015-1635), an HTTP.sys vulnerability that puts users with certain versions of Windows and IIS at risk. Microsoft also issued a patch as...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    November 18, 2014

    There’s an elephant in the room when it comes to big data, and I’m not just talking about the one in the Apache Hadoop logo. But, we’ll get back to that. First a little context....Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 06, 2010

    Imperva has announced Incapsula. The cloud-based, web application firewall service gives small businesses an easy and affordable way to manage website security and performance for any domain that they own, even if it's hosted by...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 21, 2009

    Few more days and the year 2009 will be behind us. The technology fans are now into movies due to James Cameron's recent masterpiece. As geeks and movie fans (including yours truly) are raving The...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Here's our central location for helpful advice, tips, how-to information, and best practices.

    Subscribe: RSS | Email

    May 14, 2015

    A post this week on Jordan Wright’s blog has generated quite a bit of discussion here at Imperva on the subject of industrial hacking. Jordan talks about a large number of attempts (at least one...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    The automatic synchronization (auto-sync) feature between unmanaged devices and cloud apps like Office 365 and Box has a potential downside: loss of sensitive corporate information. Check out the Imperva Skyfence blog for more information.Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 13, 2015

    Several dozen Imperva Incapsula customers were recently targeted by a DDoS botnet comprised of tens of thousands of hijacked routers. After informing the major companies involved, we are sharing attack details in an attempt to...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 11, 2015

    To be successful in the cloud, IT organizations should abandon their ‘Engineering’ mentality and embrace a ‘Cloud’ mentality. I've worked with quite a few companies that struggle with this change in mindset and as a...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »