This was H1 2022 – Part 1 – The Fight Against Cybercrime

After many long lockdowns, the information technology industry woke up to a new reality. Cyber crime was too widespread and heavily resourced. Hybrid architectures had grown too complex to be able to ...
Visibility into Peacetime Traffic. Is it Too Much to Expect From Your DDoS Protection Provider?

Visibility into Peacetime Traffic. Is it Too Much to Expect From Your DDoS Protection Provider?

Today, everyone has at least one insurance policy. It could be a healthcare, automobile, or life insurance policy. We invest heavily in these policies and have high expectations for a return on ...
endpoint Qualys security culture Palo Alto Networks SASE network VPN cybersecurity culture

Endpoint Sprawl Raises Security Risks

The explosion of endpoint devices is making it even more challenging for IT departments and security teams to obtain both visibility and control over these devices. According to a new report from ...
Security Boulevard
Ten common causes of downtime and how to avoid them (Google Cloud Next '17)

Understanding user intent – the panacea for mission-critical application QoE issues

In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT ...

How Not to Protect APIs From Attack

| | API security, APIs, Bots, ddos
It has been a couple of weeks since the return of RSA Conference to San Fran’s Moscone Center. There was a ton of energy on the floor, and those who attended were ...
Russian Hackers Declare War on Lithuania — Killnet DDoS Panic

Russian Hackers Declare War on Lithuania — Killnet DDoS Panic

NATO member Lithuania is under attack from Russian hacking group Killnet. It raises serious concerns over Russia’s use of cyber warfare against NATO states ...
Security Boulevard
™

Five Ways the Gaming & Gambling Industry is Targeted by Bad Bots

Let’s play a game of chance: What are the odds that your gaming website is being targeted by bad bots? Imperva research suggests they’re higher than you may think. Imperva’s 2022 Bad ...
The Security Vulnerabilities of Third-Party Collaboration Tools

The Security Vulnerabilities of Third-Party Collaboration Tools

How many of you still participate in-person meetings on a daily basis? If this question was asked before the beginning of 2020, it would have raised several eyebrows. Our working days prior ...

Natural Language Processing and “Mindful” AI Drive More Sophisticated Bad Bot Attacks

The evolution from human to bot attacks Over the last several years of my career in cyber security, I have been fortunate to work with professionals who researched and developed new cyber ...

Four Key Findings from the 2022 Cyberthreat Defense Report

For the ninth year, Imperva is proud to sponsor CyberEdge Group’s annual Cyberthreat Defense Report. In this report, CyberEdge Group delivers a detailed accounting of how IT security professionals perceive cyberthreats today ...