Category: Blog

Segmenting Hybrid Clouds: What to Look for in a Solution

Learn how to select a microsegmentation solution to fortify your organization?s cloud security strategies and protect your assets across multiple public clouds. This article has been indexed from Blog Read the original article: Segmenting Hybrid Clouds: What to Look for…

Meet Andy Zollo, SVP of APJ Sales

Andy Zollo, who led the Imperva business in EMEA, relocated to Singapore in October to be Senior Vice President of Sales for the combined Imperva and Thales CPL businesses in the APJ region. With a wealth of experience in sales…

Imperva: A Leader in WAAP

Imperva – a Thales company and leading provider of Web Application and API Protection (WAAP) solutions, is a force to be reckoned with in the cybersecurity landscape. Our comprehensive approach to security, encompassing database security, enterprise application security, bot management,…

Java(Script) Drive-By, Hacking Without 0days

A remote code execution chain in Google Chrome, which allows an attacker to execute code on the host machine, can cost anywhere from $250,000 to $500,000. Nowadays, such powers are typically reserved for governments and spy agencies. But not so…

Exploring Artificial Intelligence: Is AI Overhyped?

Dive into AI technologies like inference, deep learning, and generative models to learn how LLMs and AI are transforming cybersecurity and tech industries. This article has been indexed from Blog Read the original article: Exploring Artificial Intelligence: Is AI Overhyped?

Cyber Threats in Costume: When Attacks Hide Behind a Mask

Introduction As Halloween approaches, the idea of costumes and disguises takes center stage, but the spirit of deception isn’t limited to one night. In the digital world, cyberattacks can also wear masks, concealing their true intentions to slip past defenses.…

Bad Bots: 6 Common Bot Attacks and Why They Happen

Learn about the different types of bot attacks, why they happen, and how to protect your website from these threats with effective bot mitigation strategies. This article has been indexed from Blog Read the original article: Bad Bots: 6 Common…

Modernizing Data Security: Imperva and IBM Z in Action

As data security continues to evolve, businesses require solutions that scale to modern environments. Imperva and IBM Z have partnered to deliver a comprehensive approach to securing data within IBM z/OS environments while supporting the agility, resource availability, and cost-efficiency…

ShadyShader: Crashing Apple Devices with a Single Click

Introduction A while ago, we discovered an interesting vulnerability in the GPU’s drivers of iPhones, iPads, and macOS computers with M-series chips. Dubbed ShadyShader, this flaw allows a specially crafted shader program to overwhelm Apple’s GPU, causing repeated freezes that…

Modernizing Data Security: Imperva and IBM zSystems in Action

As data security continues to evolve, businesses require solutions that scale to modern environments. Imperva and IBM zSystems have partnered to deliver a comprehensive approach to securing data within IBM z/OS environments while supporting the agility, resource availability, and cost-efficiency…

ShadyShader: Crashing Apple Devices with a Single Click

Introduction A while ago, we discovered an interesting vulnerability in the GPU’s drivers of iPhones, iPads, and macOS computers with M-series chips. Dubbed ShadyShader, this flaw allows a specially crafted shader program to overwhelm Apple’s GPU, causing repeated freezes that…

Modernizing Data Security: Imperva and IBM zSystems in Action

As data security continues to evolve, businesses require solutions that scale to modern environments. Imperva and IBM zSystems have partnered to deliver a comprehensive approach to securing data within IBM z/OS environments while supporting the agility, resource availability, and cost-efficiency…

Imperva Defends Against Targeted Exploits Used By APT29 Hackers

Recently, U.S. and U.K. cyber agencies have warned of a renewed wave of attacks led by Russian APT29 hackers. These sophisticated threat actors have been actively exploiting vulnerabilities in Zimbra Collaboration Suite and JetBrains TeamCity, specifically CVE-2022-27924 and CVE-2023-42793, to…

How to Detect Suspicious API Traffic

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: How to Detect Suspicious API Traffic

How to Reduce API Sprawl with API Discovery

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: How to Reduce API Sprawl with API Discovery

My Journey To CTO for Imperva App Sec

I’m delighted to be announcing that I’ve joined Imperva as the CTO for Application Security. Many of you readers know me as the Forrester analyst covering Zero Trust, SASE, and network security since before the pandemic. But what you might…

5 Reasons Why You Need API Discovery

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: 5 Reasons Why You Need API Discovery

How to Implement Zero Trust on a Budget

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: How to Implement Zero Trust on a Budget

Agentless is a DAM Better Option for Securing Cloud Data

When it comes to on-premises database activity monitoring (DAM), security teams have consistently relied on agents to seamlessly track all incoming requests and outgoing responses within the databases. The agent-based approach effectively ensures independent monitoring of database activity, regardless of…

Taking Steps to Prepare for Quantum Advantage

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Taking Steps to Prepare for Quantum Advantage

How Cyberthreats Could Disrupt the Olympics

Introduction Cybersecurity experts are on high alert, as the 2024 Olympic Games continue over the coming weeks. Historically, the Olympics have been a prime target for cybercriminals, state-sponsored actors, and hacktivists. The convergence of global attention, vast amounts of sensitive…

How Cyberthreats Could Disrupt the Olypmics

Introduction Cybersecurity experts are on high alert, as the 2024 Olympic Games continue over the coming weeks. Historically, the Olympics have been a prime target for cybercriminals, state-sponsored actors, and hacktivists. The convergence of global attention, vast amounts of sensitive…

Effortless certificate management with automated CNAME validation

Imperva customers who properly utilize the managed certificate feature can experience a robust,  interruptions-free, and fully automated certificate management process that requires no effort for domain validations and renewals. In today’s digital landscape, security is of paramount importance. One critical…

On Entrust? Imperva has your back!

Managing SSL/TLS certificates is a critical yet complex task for any organization. Certificates ensure secure communication between users and your web applications, but maintaining them involves constant vigilance and expertise. From monitoring expiration dates to renewing and deploying new certificates,…

PCI DSS v4.0.1: Meeting New Client-Side Security Requirements

Learn how Akamai Client-Side Protection & Compliance helps organizations meet the latest payment security updates and clarifications outlined in PCI DSS v4.0.1. This article has been indexed from Blog Read the original article: PCI DSS v4.0.1: Meeting New Client-Side Security…

PCI DSS v4.0.1: Meeting New Client-Side Security Requirements

Learn how Akamai Client-Side Protection & Compliance helps organizations meet the latest payment security updates and clarifications outlined in PCI DSS v4.0.1. This article has been indexed from Blog Read the original article: PCI DSS v4.0.1: Meeting New Client-Side Security…

Unveiling the 2024 Imperva DDoS Threat Landscape Report

In the ever-changing landscape of cybersecurity, Distributed Denial of Service (DDoS) attacks continue to be a significant threat. To help organizations stay ahead, we’re excited to introduce the 2024 Imperva DDoS Threat Landscape Report. This comprehensive report offers a deep…