• All
  • Research Lab
  • Perspectives
  • Threat Central
  • Front Line
  • Subscribe: RSS | Email

    July 25, 2016

    Goodbye, Point Solution. Hello, Integrated CASB. When Imperva made the first acquisition of a Cloud Access Security Broker (CASB) vendor by purchasing Skyfence over two years ago, it was to support the Imperva strategy of...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    The marriage of Imperva ThreatRadar and Imperva Skyfence brings the best of all worlds to risk mitigation for cloud apps: current intelligence data, correlation of activity anomalies with bad-reputation sources, and a robust policy engine....Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    We are experiencing seismic shifts in the threat landscape over the last few years. Threat actors have deployed bots, increased automated attacks, and are increasingly financially motivated. They have exploited new vulnerabilities such as shell...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    July 22, 2016

    Researchers at the Imperva Defense Center analyzed traffic from a single Tor exit node and have created a series of blogs that describes what this analysis has yielded. This first blog focuses on the luring...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    July 19, 2016

    What role does the CIO play within your organization’s online security strategy? In some organizations IT is seen as a business impediment—the “office of No,” using security risk as a reason to slow down or...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    July 18, 2016

    The financial services industry is under fire, facing a never-ending barrage of cyber-attacks. Consider the following: The financial services industry is the most breached industry, accounting for 35% of data breaches – Verizon 2016 Data...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    July 14, 2016

    Most organized hackers target health care records due to the nature of personal information beyond just social security numbers and dates of birth. According to Reuters, a single stolen healthcare credential is worth $10 when...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    July 08, 2016

    An article was recently posted on the topic of applying machine learning to information security. The fact of the matter is that few sectors could benefit more from machine learning (ML) technology than cyber security....Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    July 07, 2016

    Matthew Rosenquist, Cybersecurity Strategist and Evangelist at Intel Corporation, shared a post on his LinkedIn feed discussing Intel’s approach to security with the Intel Management Engine (Intel ME). His comment accompanying the link touched upon...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    June 27, 2016

    In April 2016, Dimension Data (NTT group), a top Imperva channel partner, published the Global Threat Intelligence Report (GTIR) for the year 2015 based on threats evaluated against their clients and honeynets across a variety...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
  • Look here for our latest research reports and breaking security news.

    Subscribe: RSS | Email

    August 03, 2016

    It was November 2015 when I heard the high-pitched excitement of a researcher from our Imperva Defense Center – “HTTP/2 is susceptible to slow read attacks!” It was like déjà vu all over again; five...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    July 22, 2016

    Researchers at the Imperva Defense Center analyzed traffic from a single Tor exit node and have created a series of blogs that describes what this analysis has yielded. This first blog focuses on the luring...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    June 09, 2016

    Imperva Defense Center researchers found long-running, multi-vector Search Engine Optimization (SEO) campaigns in use by hackers to illegally promote illicit websites such as online pharmacies and adult sites. The multi-vector Black Hat SEO campaign employed...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 14, 2016

    Ransomware is now #2 in the crimeware list published by Verizon in their latest data breach report. Before we delve into the details of why crimeware/malware is spreading at such alarming levels, we would like...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • You'll find thoughts on security trends, industry news, and upcoming Imperva events here.

    Subscribe: RSS | Email

    August 16, 2016

    It would be an understatement to say the new movie Jason Bourne has gone hi-tech with its central theme of cyber warfare, espionage and surveillance. The movie storyline is set in motion because of a...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    August 15, 2016

    Wall Street Journal and Fortune recently reported that eight of the largest U.S. banks are forming an alliance to better combat the growing threat of cyber-attacks targeting the financial services industry. The new group, which...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    August 12, 2016

    As most Preppers and security experts will tell you, the majority of nations fear a loss of their power grid. Ukraine got a taste of it on December 23, 2015 when Russia allegedly launched a...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    August 11, 2016

    After twelve years in the information security industry, I finally attended the Blackhat conference. It was great, especially the Hacker sessions and the interesting presentations from experts from around the globe. Behavior Baseline, Active Response,...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Find practical information on late-breaking security threats here.

    Subscribe: RSS | Email

    August 03, 2016

    It was November 2015 when I heard the high-pitched excitement of a researcher from our Imperva Defense Center – “HTTP/2 is susceptible to slow read attacks!” It was like déjà vu all over again; five...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    July 25, 2016

    Goodbye, Point Solution. Hello, Integrated CASB. When Imperva made the first acquisition of a Cloud Access Security Broker (CASB) vendor by purchasing Skyfence over two years ago, it was to support the Imperva strategy of...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    The marriage of Imperva ThreatRadar and Imperva Skyfence brings the best of all worlds to risk mitigation for cloud apps: current intelligence data, correlation of activity anomalies with bad-reputation sources, and a robust policy engine....Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    July 22, 2016

    Researchers at the Imperva Defense Center analyzed traffic from a single Tor exit node and have created a series of blogs that describes what this analysis has yielded. This first blog focuses on the luring...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »
  • Here's our central location for helpful advice, tips, how-to information, and best practices.

    Subscribe: RSS | Email

    June 10, 2016

    Challenge today's security thinking. Learn about the top threats to enterprise data and the latest technologies in data breach prevention. The worst kept secret in enterprise security is that the people on the payroll pose...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    May 18, 2016

    With all of the recent attention around the release of Imperva CounterBreach, it may have been easy to miss our announcement regarding a recently inked partnership with Camouflage Software to provide a best-of-breed data masking...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 28, 2016

    Increasingly, Cloud Access Security Brokers (CASB) are being used by IT to align with their cloud strategies well beyond app discovery and risk assessment of unauthorized apps. Organizations are getting more value from CASBs by...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:

    February 26, 2016

    External cybersecurity threats get all the press, and they are certainly dangerous. Shadowy international gangsters, brilliant but evil hackers, mom-and-pop-shop criminals stealing from us one Target transaction at a time – as fictional as it...Read More
    Share:
    Share on LinkedIn
    • Authors & Topics:
    Next »