The Emerging Importance of Securing Access to AWS

With 50,000 attendees, over 1,000 breakout sessions and countless sponsors and exhibitors, the 2017 AWS re:Invent conference in Las Vegas was one of the...

Want to See What A Live DDoS Attack Looks Like?

We’re fortunate enough to have had Andy Shoemaker, founder of NimbusDDoS, and our own Ofer Gayer chat about DDoS attacks and shed some light on...

Tripwire FIM for Comprehensive Integrity Management

Tripwire FIM for Comprehensive Integrity Management #outlook a{ padding:0; } body{ width:100%...

Tripwire DevOps Survival Guide for Security Professionals

Tripwire DevOps Survival Guide for Security Professionals #outlook a{ padding:0; } body{...

Calculating the ROI of a Vulnerability Management Program

Calculating the ROI of a Vulnerability Management Program #outlook a{ padding:0; }...

Multi-Cloud Security Best Practice Guide

Multi-Cloud Security Best Practice Guide #outlook a{ padding:0; } body{ width:100% !important;...

Latest article

Attackers Are Quick to Exploit vBulletin’s Latest 0-day Remote Code Execution Vulnerability

Imperva’s Cloud WAF has identified instances of a new 0-day vulnerability being exploited within a matter of hours of the exploit being published. On Monday...

Ransomware: two pieces of good news

“All your files have been encrypted.” How many times has this suddenly popped up on your screen? We hope never, because it’s one of...

A Leader in the 2019 Gartner Magic Quadrant for WAF, Six Years Running

Gartner has published its 2019 Gartner Magic Quadrant for Web Application Firewalls (WAF) and Imperva has been named a Leader for the sixth consecutive...