Bruce Lynch, Author at Security Boulevard

Protecting today’s web applications requires more than a firewall

The way organizations build web applications has changed dramatically over the last several years. As a result, many organizations are considering additional security strategies to augment the Web Application Firewall (WAF) on which they have relied to protect critical digital business operations from vulnerabilities. New technology has created a development ... Read More

5 elements to include in a cybersecurity strategy for any size business

Whether you obsess about cybersecurity every day or you are completely new to the process, there are certain things that you should consider to make your company’s cybersecurity strategy successful. In this post, we’ll reveal five elements you should include in your strategy, regardless of whether you are the sole ... Read More

Six paths to a job in cybersecurity

Like many high-tech businesses, the cybersecurity industry is facing a widening skills gap. One of the main reasons why many companies do not have effective data security practices is the lack of actual skilled cybersecurity practitioners. In a November 2019 report, the International Information System Security Certification Consortium suggested that ... Read More

Four Essential Features for a Database Security Strategy to Take on a Growing Threat Landscape

For a considerable time, many organizations have used three to five on-premise databases to manage their workloads, and many teams have tried to funnel every application into using those databases. Today, as the pressure to innovate while keeping costs low intensifies, organizations have started moving many workloads to the cloud ... Read More

A security architect’s POV on a mature data-centric security program, Part 3

In part one of this series, you learned about the challenges associated with accessing, and searching long-term retained database activity logs and identifying sensitive customer data to comply with stricter compliance regulations. In part two, you gained insight into how security professionals can mitigate database security risks when executive leadership ... Read More

How to help your DevOps teams become integral to your cybersecurity strategy

What happens when an unstoppable force meets an immovable object? It’s a classic paradox, but anyone who has witnessed the relationship between SecOps and DevOps teams in any enterprise may have an inkling of how that might unfold. There is nothing new about the contentious relationship between these two groups ... Read More

Getting to Know an NCSA Champion: Imperva

As a cybersecurity industry leader, it is both our responsibility and our pleasure to work with the National Cyber Security Alliance (NCSA) and ​​the Cybersecurity and Infrastructure Agency (CISA) of the U.S. Department of Homeland Security as a 2021 Cybersecurity Awareness Month Champion and to join the growing global effort ... Read More

A security architect’s POV on a mature data-centric security program, Part 2

| | Data Security, Digest
In part one of this series, we explored the challenges associated with accessing and searching long-term retained database activity logs, and identifying sensitive customer data to comply with stricter compliance regulations. In this post, you’ll see through a security architect’s eyes the challenges of managing organizational leadership through the transition ... Read More

A security architect’s POV on a mature data-centric security program, Part 1

| | CISO, DAM, Data Security, Digest
In this three-part series, you’ll hear first-hand from security architects on the front lines about what it takes to move organizations from a compliance-centric to a mature data-centric database security model. You’ll gain insight into the challenges associated with retaining, accessing and searching long-term data, and identifying sensitive customer data ... Read More

The pitfalls of relying only on your ISP for DDoS protection

Relying on your Internet Service Provider (ISP) for DDoS protection is like going to a restaurant known for the freshest, tastiest seafood and ordering beef. Sure, they have it on the menu and they are happy to sell it to you, but the experience is not likely to compare well ... Read More
Loading...