zero day protection
“Oops, I insecurely coded again!”
The call is coming from inside the house It’s no secret that companies need to be vigilant about application security. However, frequently the source of application vulnerabilities may come as a surprise ...
Five Data Security Controls and Processes you Must Bring to Cloud-native Infrastructures
Too frequently, there are significant misunderstandings in organizations with regard to who has the responsibility to protect cloud-hosted data. In Imperva’s recent report, A Cybersecurity Framework for Securing Cloud Data for Digital ...

2021 in Review, Part 3: 5 Things Security Professionals Were Discussing this Year
Today, everyone is talking about CVE-2021-44228, and with good reason. But before that, here were five of the issues that dominated virtual “water cooler talk” in 2021: 5. Data security in the ...
2021 in Review, Part 1: 5 Cybersecurity Topics that Made News
It’s been another chaotic year in cybersecurity, as protecting web applications and stopping sensitive data breaches remain top-of-mind issues and continue to generate headline news. As 2021 comes to a close, cybersecurity ...
Benefits of Building a Multi-prong Mousetrap for WAF Policies with ML
The reason behind buying a market-leading Web Application Firewall (WAF) is to protect your website and web applications from malicious attacks, plus complying with industry or regional data and privacy standards. In ...

5 Ways Your Software Supply Chain is Out to Get You, Part 1: Vendor Compromise
Is 2021 the year of the software supply chain attack? In late 2020, an incredible story broke: US government agencies, including Commerce, Treasury, and Homeland Security, had been severely compromised through a ...

Imperva Observes Hive of Activity Following Hafnium Microsoft Exchange Disclosures
Introduction On 2 March 2021, Microsoft and Veloxity produced disclosures outlining the discovery of four zero day vulnerabilities affecting multiple versions of Microsoft Exchange Server. Each of the vulnerabilities have been attributed ...

Attacks Spike Following The Disclosure Of CVE-2021-22986: F5 Networks BIG-IP iControl Remote Command Execution Vulnerability
On March 10th F5 published a security advisory containing twenty one CVEs, the most critical one (CVE-2021-22986) can be exploited for unauthenticated remote code execution attacks. In the past week, several security ...