Digest
Why Agentless DAM is a Better Option for Securing Cloud Data
In the context of on-premises database activity monitoring (DAM), security teams use agents to enable them to see all requests coming into the databases as well as all responses going out of ...

How to Teach Colleagues About the Dangers of Phishing
Every day worldwide, tens of thousands of employees fall prey to phishing scams. In the second quarter of 2022, the Anti-Phishing Working Group (APWG) saw 1,097,811 total phishing attacks, the worst quarter ...

13 Cybersecurity Horror Stories to Give you Sleepless Nights
Are we sitting comfortably? Twas a dark and stormy night, and the cybersecurity team stood patiently in their Scrum meeting. “Tell us a tale,” the CISO said, and one of their number ...

Imperva Stops Hordes of Bots from Hijacking Financial Accounts in Largest Recorded Account Takeover Attack
Consider for a moment that an army of bots is setting their sights on your website. They target your login page and hammer it with millions of requests in an ongoing attack ...

What is Quantum Computing, and Why Should Security Professionals Care?
Quantum computing basics Quantum computing embraces the laws of quantum mechanics to solve those problems that are currently too challenging for even the most high-performance modern computers. Across the board, it is ...
How Imperva Mitigates Security Threats in Oracle Cloud Infrastructures
Most organizations today rely on an unprecedented number of computing resources to build, deploy and scale the workflows and applications they need to succeed. They are responsible for more data than ever ...
Why Cybersecurity Awareness Month is Every Month
Cybersecurity is a year-round issue Cybersecurity awareness is important year-round for the security of our businesses and customers. We’re proud to be a supporter of Cybersecurity Awareness Month. It has been invaluable ...

The Global DDoS Threat Landscape – October 2022
Every month in this space, we will post the Global DDoS Threat Landscape blog on behalf of the Imperva Threat Research team. As DDoS attacks continue to pose a significant risk to ...
The Four-Step Approach to Modernizing Your DAM Strategy
Effective data security is critical to an organization’s success and requires a strategy that aligns with the company’s objectives and those of its stakeholders. As the data landscape changes, most Database Activity ...

Gain Control of Rapidly Securing Your Critical APIs Without Worrying About Your Backend Stack
Imagine trying to protect your web application farm, while needing to integrate with all the different web servers’ backend stacks on a one-to-one basis. This requires a WAF that understands systems such ...