Why the Path Towards Zero Trust Starts with Next-Gen Access
Zero Trust Security has gained a lot of popularity over the last six months. Almost daily you can read articles about this security strategy...
The State of Web Application Vulnerabilities in 2018
(Jan. 12 update: Due to a data transfer error, some of the 2017 figures were incorrectly reported; this version of the blog has been corrected....
Complete Guide to Creating a Sound IT Environment
Tripwire, Inc.
Securing AWS Cloud Management Configurations
Securing AWS Cloud Management Configurations #outlook a{ padding:0; } body{ width:100% !important;...
Imperva Joins Global Cybersecurity Tech Accord
Imperva is dedicated to the global fight to keep people’s data and applications safe from cybercriminals. What this means for our Imperva Threat Research...
Platinum is back
In June 2018, we came across an unusual set of samples spreading throughout South and Southeast Asian countries targeting diplomatic, government and military entities....
Learn the essential DevOps practices that today’s most successful organizations are implementing
Learn the essential DevOps practices that today's most successful organizations are implementing ...
Your new friend, KLara
While doing threat research, teams need a lot of tools and systems to aid their hunting efforts – from systems storing Passive DNS data...
Casino Goes All In and Wins Big with Imperva Security
There’s no good time to be hit by ransom-seeking DDoS attackers. For one casino-entertainment provider, the timing was particularly bad — right before one...