Imperva Mitigates Exploits of Citrix Vulnerability – Right Out of the Box

| | Application Security, Labs
On December 17, Citrix issued a Security Bulletin on an unauthenticated remote code execution vulnerability (CVE-2019-19781) affecting its Citrix Application Delivery Controller (ADC) – formerly known as NetScaler ADC – and its ...
Salt 2 diagram 1

Adding Some Salt to Our Network – Part 2

| | Application Delivery, Labs
How our configuration management actually works Following a previous post which explained why we needed a configuration management system, this post explores how we built and implemented our configuration management using SaltStack ...
ETL post

Serverless ETLs? Easy Data Lake Transformations using AWS Athena

| | Labs
In a data lake raw data is added with little or no processing, allowing you to query it straight away. This gives you a great way to learn about your data – ...
Cloud template 1

Cloud Template Tool – The only way for Imperva On-Premises deployment on AWS

For the last six years, Imperva’s customers have been able to deploy our On-Premises product on AWS and enjoy the many advantages of cloud deployment including flexibility, cost-effectiveness, scalability, accessibility and many ...
query output

SQL Server 2019 Security Tool Inadvertently Reveals Where Sensitive Data is Stored

| | Data Security, Labs
The first step in protecting your data and ensuring your database is compliant with security benchmarks and privacy regulations such as SOX, PCI, HIPAA, and GDPR is to understand what sensitive information ...

Top 5 Cybersecurity Trends to Prepare for in 2020

I don’t need a crystal ball to predict that in 2020 cybersecurity attacks will accelerate and the tactics will evolve. We’ll continue to be hounded by greater volumes of the attacks that ...

Adding Some Salt to Our Network – Part 1

| | Labs
Why configuration management system was a must for our network, and how we chose SaltStack When we planned and designed the network automation at Imperva Cloud, we split our automation systems into ...
waf blog diagram

How to Maximize Your WAF

| | Labs
Whenever new WAF clients are brought aboard, there’s a procedure they must follow in order to properly configure their servers to work behind the WAF protection. You can find an example of ...
ML Project Cycle

Deployment Isn’t the Final Step – Monitoring Machine Learning Models in Production

| | Labs
Unless you’ve been living in a cave for the last decade, you’ve probably heard of the concept of a machine learning system at least once in your life. Whether it’s auto-translation, auto-completion, ...
Alert Fatigue (IT Professionals Survey, Imperva)

From Thousands of Security Alerts to a Handful of Insights

| | Labs
Understanding an attacker’s workflow and how Attack Analytics hunts them down In recent years we’ve seen a significant increase in the number and complexity of cyber-attacks. The accessibility of public tools and ...