Why Agentless DAM is a Better Option for Securing Cloud Data

In the context of on-premises database activity monitoring (DAM), security teams use agents to enable them to see all requests coming into the databases as well as all responses going out of ...
Rick Astley - Never Gonna Give You Up (Official Music Video)

How to Teach Colleagues About the Dangers of Phishing

Every day worldwide, tens of thousands of employees fall prey to phishing scams. In the second quarter of 2022, the Anti-Phishing Working Group (APWG) saw 1,097,811 total phishing attacks, the worst quarter ...
How a Fake Credit Card Is Made | WIRED

13 Cybersecurity Horror Stories to Give you Sleepless Nights

Are we sitting comfortably? Twas a dark and stormy night, and the cybersecurity team stood patiently in their Scrum meeting. “Tell us a tale,” the CISO said, and one of their number ...
Imperva Stops Hordes of Bots from Hijacking Financial Accounts in Largest Recorded Account Takeover Attack

Imperva Stops Hordes of Bots from Hijacking Financial Accounts in Largest Recorded Account Takeover Attack

Consider for a moment that an army of bots is setting their sights on your website. They target your login page and hammer it with millions of requests in an ongoing attack ...
Interference in quantum mechanics

What is Quantum Computing, and Why Should Security Professionals Care?

Quantum computing basics Quantum computing embraces the laws of quantum mechanics to solve those problems that are currently too challenging for even the most high-performance modern computers. Across the board, it is ...

How Imperva Mitigates Security Threats in Oracle Cloud Infrastructures

Most organizations today rely on an unprecedented number of computing resources to build, deploy and scale the workflows and applications they need to succeed. They are responsible for more data than ever ...

Why Cybersecurity Awareness Month is Every Month

Cybersecurity is a year-round issue Cybersecurity awareness is important year-round for the security of our businesses and customers. We’re proud to be a supporter of Cybersecurity Awareness Month. It has been invaluable ...
The Global DDoS Threat Landscape – October 2022

The Global DDoS Threat Landscape – October 2022

Every month in this space, we will post the Global DDoS Threat Landscape blog on behalf of the Imperva Threat Research team. As DDoS attacks continue to pose a significant risk to ...

The Four-Step Approach to Modernizing Your DAM Strategy

Effective data security is critical to an organization’s success and requires a strategy that aligns with the company’s objectives and those of its stakeholders. As the data landscape changes, most Database Activity ...
Gain Control of Rapidly Securing Your Critical APIs Without Worrying About Your Backend Stack

Gain Control of Rapidly Securing Your Critical APIs Without Worrying About Your Backend Stack

Imagine trying to protect your web application farm, while needing to integrate with all the different web servers’ backend stacks on a one-to-one basis. This requires a WAF that understands systems such ...