Unsecured databases found leaking half a billion resumes on the net

Unsecured databases found leaking half a billion resumes on the net

A staggering 590,497 million resumes have leaked from poorly-secured Chinese companies in just the last three months. The post Unsecured databases found leaking half a billion resumes on the net appeared first ...
How Our Threat Analytics Multi-Region Data Lake on AWS Stores More, Slashes Costs

How Our Threat Analytics Multi-Region Data Lake on AWS Stores More, Slashes Costs

Data is the lifeblood of digital businesses, and a key competitive advantage. The question is: how can you store your data cost-efficiently, access it quickly, while abiding by privacy laws? At Imperva, ...
A Quick-Start Introduction to Database Security: An Operational Approach

A Quick-Start Introduction to Database Security: An Operational Approach

The recent SingHealth data breach incident exposed 1.5 million patients’ records. In the aftermath, the Cyber Security Agency of Singapore published a set of security measures aimed at improving the protection of ...

Appthority Discovers Thousands of Apps with Firebase Vulnerability Exposing Sensitive Data

Appthority has discovered a significant mobile data vulnerability related to Google Firebase which has resulted in the exposure of a wide range and large amounts of sensitive data through thousands of mobile ...

The Analytic Staircase for Auditors

Building a successful audit analytics program is like climbing a staircase. The staircase is a set of steps that consist of several items having increasing levels of maturity. The staircase steps not ...
Open Sourcing Our Specialized TinkerGraph with 70% Memory Reduction and Strict Schema Validation

Open Sourcing Our Specialized TinkerGraph with 70% Memory Reduction and Strict Schema Validation

Most tech companies these days rely heavily on libre/open-source software, often contributed by volunteers in their spare time. ShiftLeft believes it is important to give back by contributing code and artifacts to ...
Asterisk Flaw Exposes VoIP Calls to Eavesdropping

Asterisk Flaw Exposes VoIP Calls to Eavesdropping

Security researchers have identified a critical vulnerability in Asterisk, one of the most popular software stacks for implementing private telephone switching systems, also known as private branch exchanges (PBXes). The flaw could ...