How to (Securely) Share Certificates with Your Cloud Security Provider

How to (Securely) Share Certificates with Your Cloud Security Provider

Businesses today know they must handle sensitive data with extra care. But evolving cyber threats combined with regulatory demands can lead executives to hold their proverbial security cards close to their chest ...

WAFs Are Failing To Protect Hyper-Connected Organizations. But Help Is On Its Way.

Over the last 10 years, we’ve seen the continuing growth and evolution of hyper-connected organizations. These are the forward-leaning enterprises that have embraced the Internet to connect customers, partners, and suppliers, enabling ...

Cloud WAAPs Are the Future of Application Security. But What Does That Mean?

Millions of Verizon FIOS broadband users vulnerable to hackers controlling and surveilling their home networks. Thousands of GPS watches whose maps were open to attackers tracking and eavesdropping on children and elderly ...

Casino Goes All In and Wins Big with Imperva Security

There’s no good time to be hit by ransom-seeking DDoS attackers. For one casino-entertainment provider, the timing was particularly bad — right before one of its largest online poker events in 2016 ...
The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack

The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack

DDoS attacks have always been a major threat to network infrastructure and web applications. Attackers are always creating new ways to exploit legitimate services for malicious purposes, forcing us to constantly research ...
The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

For those of us in the security industry, the annual Cyberthreat Defense Report is a gold mine of insights into the minds of IT security professionals, including what threats keep them up ...
Will We Ever See the End of Account Theft?

Will We Ever See the End of Account Theft?

There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know that many users of websites are using the ...
automated api.png

Automated API Protection with WAP

For those who use Web Application Protector from Akamai: "Your APIs just got an extra layer of protection" ...
Keeping Pace in the Race for Flexibility

Keeping Pace in the Race for Flexibility

Flexibility and elasticity. Both rank high on the corporate agenda in the age of digital transformation and IT is no exception. From the perspective of IT, virtualization and cloud computing have become ...
Sucuri Web Security Platform dashboard

Automated WordPress Security & Protection with Sucuri

WordPress security is easy, when you have the right automated tools. When I started using WordPress I did all the site hardening myself, manually. WordPress security hardening is not difficult, especially if ...
Loading...