Take these Five Steps to Really Mitigate your Data Breach Risks

Data breaches are a CSO/CISO’s worst nightmare. And they’re getting bigger and more damaging all the time. It’s no longer just hundreds of millions of users whose personal data is stolen at ...

Our “Assessing the Impact of Machine Learning on Security” Published

Here is a fun one: our new paper “Assessing the Impact of Machine Learning on Security” just went up. It contains [the product of the] brains of at least 2 PhDs. Also, ...
Cloud Security Myth #4 – Security slows down your ability to get insights

Cloud Security Myth #4 – Security slows down your ability to get insights

Data security and real-time analytics are not exclusive, but they do require the right technology to effectively co-reside without impacting performance. The post Cloud Security Myth #4 – Security slows down your ...
What keeps CMOs up at night in a data driven world?

What keeps CMOs up at night in a data driven world?

Learn how to strategically overcome data breach and regulatory compliance challenges keeping data-driven CMOs up at night.The post What keeps CMOs up at night in a data driven world? appeared first on ...
DNS Attack on Yandex – Can It Happen to You?

DNS Attack on Yandex – Can It Happen to You?

Last week, Russian media was hit with news about massive DNS (Domain Name System) attacks on Yandex, the country’s biggest technology company and local giant of internet search – essentially, the Google ...
The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

For those of us in the security industry, the annual Cyberthreat Defense Report is a gold mine of insights into the minds of IT security professionals, including what threats keep them up ...
Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs

Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs

This guide gives step-by-step guidance on how to collect and parse Imperva Cloud Web Application Firewall (WAF, formerly Incapsula) logs into the Graylog SIEM tool. Read Part I to learn how to ...
How Our Threat Analytics Multi-Region Data Lake on AWS Stores More, Slashes Costs

How Our Threat Analytics Multi-Region Data Lake on AWS Stores More, Slashes Costs

Data is the lifeblood of digital businesses, and a key competitive advantage. The question is: how can you store your data cost-efficiently, access it quickly, while abiding by privacy laws? At Imperva, ...
How to Gain Maximum Value from Closed Loop Automation (CLA)

Closed-Loop Automation: What it means for CSPs | Allot

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – ...
Loading...