Labs

COVID-19 (coronavirus) Malware: New OT and IoT Security Tools

While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of…

9 months ago

The State of Vulnerabilities in 2019

As a web application firewall provider, part of our job at Imperva is to continually monitor for new security vulnerabilities.…

11 months ago

Imperva Mitigates Exploits of Citrix Vulnerability – Right Out of the Box

On December 17, Citrix issued a Security Bulletin on an unauthenticated remote code execution vulnerability (CVE-2019-19781) affecting its Citrix Application…

11 months ago

Adding Some Salt to Our Network – Part 2

How our configuration management actually works Following a previous post which explained why we needed a configuration management system, this…

11 months ago

Serverless ETLs? Easy Data Lake Transformations using AWS Athena

In a data lake raw data is added with little or no processing, allowing you to query it straight away.…

12 months ago

Cloud Template Tool – The only way for Imperva On-Premises deployment on AWS

For the last six years, Imperva’s customers have been able to deploy our On-Premises product on AWS and enjoy the…

12 months ago

SQL Server 2019 Security Tool Inadvertently Reveals Where Sensitive Data is Stored

The first step in protecting your data and ensuring your database is compliant with security benchmarks and privacy regulations such…

1 year ago

Top 5 Cybersecurity Trends to Prepare for in 2020

I don’t need a crystal ball to predict that in 2020 cybersecurity attacks will accelerate and the tactics will evolve.…

1 year ago

Adding Some Salt to Our Network – Part 1

Why configuration management system was a must for our network, and how we chose SaltStack When we planned and designed…

1 year ago

How to Maximize Your WAF

Whenever new WAF clients are brought aboard, there’s a procedure they must follow in order to properly configure their servers…

1 year ago