Data Security

Security and COVID-19: Securing the New Normal

The year 2020 is likely to go down in history as one of the most memorable and pivotal periods in…

3 days ago

Virtual Hackathon Generates Next Generation of Imperva Innovation

“How do we run a global hackathon amid a global pandemic?” That was my first thought when I began planning…

6 days ago

Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]

With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect…

2 weeks ago

DevSecOps: 4 Reasons You Need One

Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what…

2 weeks ago

3 Ways to Prepare Your Enterprise’s Data Security for a Future of Advanced Attacks

One significant negative implication of technology’s continual evolution is proportional advancement in nefarious internet activities, particularly cyber attacks. The past…

3 weeks ago

5 Ways to Protect Online Learning Environments

As most schools continue to provide online learning during COVID-19, here are some ways to keep students and systems protected…

1 month ago

Life post-acquisition: A people-centric plan to get you total data security a lot faster

Getting acquired can be an emotional rodeo. Some days are crazy excitement and others are heartache over the unknowns ahead.…

2 months ago

Never Leave Your Cloud Database Publicly Accessible

Introduction In cybersecurity, we often hear about best practices, one of the most important of which is never to open…

2 months ago

Remote, Hybrid Work Need Better Data Security

2020 is a uniquely transformative year. Prompted by a global pandemic, we’ve been forced to change many things about how…

2 months ago

Security Threats Targeting the Remote Workforce

Having a remote workforce has become more popular with the advancement of technology and the ease of working in the…

2 months ago