• All
  • Research Lab
  • Perspectives
  • Threat Central
  • Front Line
  • Subscribe: RSS | Email

    March 20, 2015

    Imperva recently made some cyber security predictions for 2015. In the first prediction, The Year of Revolt, the point about consumer dissatisfaction with credit card churn really resonates with me. Of course nobody enjoys the...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    March 11, 2015

    Recently I attended a Big Data related event, sponsored by a banking association. The content was pretty valuable, with tracks being organized into two main threads: What Big Data is. Architectural discussion followed by the...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 18, 2015

    It is like in the movie Groundhog Day, same story different day. It is very often that with brand new technologies people forget completely all the IT security awareness and security routines they developed over...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 13, 2015

    With the White House Summit on Cybersecurity and Consumer Protection happening just down the road from Imperva headquarters today, I thought I’d share a few more comments on some of the proposals that are front...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 12, 2015

    Having lived in Europe for the majority of my life, and in the US for the recent few years, I have been exposed to sports audiences of both Soccer and Football. Somehow I always find...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
  • Look here for our latest research reports and breaking security news.

    Subscribe: RSS | Email

    February 12, 2015

    Having lived in Europe for the majority of my life, and in the US for the recent few years, I have been exposed to sports audiences of both Soccer and Football. Somehow I always find...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 05, 2015

    I have been taking part in several conversations lately that evolve around data audit in different scopes, looking into patterns and especially at the value of auditing certain data types vs. others in order to...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    January 14, 2015

    Imperva has been in the business of protecting the high-value applications and data assets at the heart of the enterprise since 2002. In the years since, we’ve gained tremendous knowledge about cyber security and the...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 09, 2014

    Nothing gets me into the holiday spirit like a nice number crunching exercise. This is especially true after our previous blog, where we looked at last year’s holiday season attacks. To have a better understanding...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • You'll find thoughts on security trends, industry news, and upcoming Imperva events here.

    Subscribe: RSS | Email

    February 13, 2015

    With the White House Summit on Cybersecurity and Consumer Protection happening just down the road from Imperva headquarters today, I thought I’d share a few more comments on some of the proposals that are front...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 10, 2015

    This morning, Imperva announced some important new capabilities in the Imperva Skyfence product line. Frank Cabri has outlined these in depth in the Skyfence product blog. The use case that I find most compelling is...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 06, 2015

    Perspectives on the Anthem breach: 1. The sad fact is that health information has become one of the most valuable assets to the hacker community the reason, I think, is that it's comprehensive enough to...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    January 28, 2015

    Yesterday, Qualys researchers made public a buffer overflow vulnerability in a component of the glibc library. At this time, there is no known exploitation vector for most popular applications (http://seclists.org/oss-sec/2015/q1/283). Further, there is a very...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Find practical information on late-breaking security threats here.

    Subscribe: RSS | Email

    November 18, 2014

    There’s an elephant in the room when it comes to big data, and I’m not just talking about the one in the Apache Hadoop logo. But, we’ll get back to that. First a little context....Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 06, 2010

    Imperva has announced Incapsula. The cloud-based, web application firewall service gives small businesses an easy and affordable way to manage website security and performance for any domain that they own, even if it's hosted by...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 21, 2009

    Few more days and the year 2009 will be behind us. The technology fans are now into movies due to James Cameron's recent masterpiece. As geeks and movie fans (including yours truly) are raving The...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    December 16, 2009

    I came across an Oracle eBusiness video demonstrating a full step-by-step reproduction of an attack leading to a remote take over of the administrative interfaces of the Oracle eBusiness system. The vulnerabilities were discovered during...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Here's our central location for helpful advice, tips, how-to information, and best practices.

    Subscribe: RSS | Email

    March 20, 2015

    Imperva recently made some cyber security predictions for 2015. In the first prediction, The Year of Revolt, the point about consumer dissatisfaction with credit card churn really resonates with me. Of course nobody enjoys the...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    March 11, 2015

    Recently I attended a Big Data related event, sponsored by a banking association. The content was pretty valuable, with tracks being organized into two main threads: What Big Data is. Architectural discussion followed by the...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 18, 2015

    It is like in the movie Groundhog Day, same story different day. It is very often that with brand new technologies people forget completely all the IT security awareness and security routines they developed over...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    January 27, 2015

    Many organizations struggle to implement security controls and technology within their enterprises due to a very common management error: failure to use a top-down approach to deploy security solutions. First, what is a ‘top-down’ approach?...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »