Taking Stock: The Internet of Things, and Machine Learning Algorithms at War

Cybersecurity is adversarial in nature, hackers try to understand security mechanisms and how to bypass them ... Read More
Imperva Recognized as a 2018 Gartner Magic Quadrant WAF Leader, Five Years Running

Imperva Recognized as a 2018 Gartner Magic Quadrant WAF Leader, Five Years Running

In the 2018 Gartner Magic Quadrant for Web Application Firewalls (Figure 2), Gartner recognized Imperva as “a good shortlist candidate for all kind of organizations, especially large enterprises looking for high-security WAF appliances, or organizations planning to transition their applications from on-premises to the cloud.” ... Read More

Explainer Series: What is Clickjacking?

Here we go, another online trap ready to ensnare unsuspecting – well, until now anyway – users. As if Phishing, Cryptojacking, credential stuffing and old school scamming wasn’t enough, folks really just can’t catch a break these days. Anyway, we’re here to chat about clickjacking, for those of you who ... Read More
An example of a successful account takeover attack using Hydra, a credential stuffing tool

Watch: An Account Takeover Attack Using Credential Stuffing, and How to Protect Against It [Video]

As cryptocurrencies continue to grow in diversity, so too do the threats they face, specifically those targeting the cryptocurrency exchange. Now, more than ever, cryptocurrency exchanges are facing security threats in the form of volumetric and application layer DDoS and account takeover (ATO) attacks. Although the success of cryptocurrency exchanges ... Read More

Building an Effective API Security Strategy: Easy If You Have the Right Tools

In their approach to application programming interface (API) security, organizations exposing web APIs must balance ease of access with control. Like the bank robber attacking banks because “that’s where the money is,” the use of APIs to provide access to applications and to business-critical data has naturally led to API ... Read More

Cloud Security For The Healthcare Industry: A No-Brainer

The healthcare industry has become one of the likeliest to suffer cyber-attacks, and there’s little wonder why. Having the financial and personal information of scores of patients makes it a very appetizing target for attackers. Just over a year ago, the WannaCry ransomware attack wreaked havoc on the UK National ... Read More

Read: Our Top Picks for 2018’s Biggest Cybersecurity Stories… So Far

Our threat research team’s been burning the candle at both ends this year, what with the sheer number of nasties out there at any given time. But with so many to choose from, how did we populate a list with just seven cybersecurity threats, and why? For one, it’ll take ... Read More

The Gartner CISO Playbook: Leveraging Effective Control in the Cloud

For as long as we can remember, the concept of control has rested comfortably in physical location and ownership. It’s simple, if you could see something or you knew exactly where it was, it would be easier to assume that you’d have some measure of control over its security. With ... Read More

Five Ways Imperva Attack Analytics Helps You Cut Through the Event Noise

The maddening volume of events security teams have to deal with each day is growing at an exponential pace, making it increasingly difficult to effectively analyze and process credible threats. As more organizations move to cloud-based solutions, applications now reside at multiple locations – on premises, in the cloud or ... Read More

See If You’re GDPR-Ready With Our Last-Minute Checklist

Time’s just about run out to get all your ducks in a row for the EU’s General Data Protection Regulation (GDPR) going into effect on May 25, and we’ve put together a little refresher toolkit to help you dot your Is and cross your Ts. Whether you’re planning on sticking ... Read More
Loading...