The Executive’s Guide to the CIS Controls

The Executive's Guide to the CIS Controls #outlook a{ padding:0; } body{...

2019 Verizon DBIR Response Checklist

2019 Verizon DBIR Response Checklist #outlook a{ padding:0; } body{ width:100% !important;...

Meeting the True Intent of File Integrity Monitoring

Meeting the True Intent of File Integrity Monitoring #outlook a{ padding:0; }...

Five Tips for Communicating Information Security to the Board

Five Tips for Communicating Information Security to the Board #outlook a{ padding:0;...

15 Myths and Risk Factors in Vulnerability Management

15 Myths and Risk Factors in Vulnerability Management #outlook a{ padding:0; }...

Cloud Security Risks and Solutions

Cloud Security Risks and Solutions #outlook a{ padding:0; } body{ width:100% !important;...

Calculating the ROI of a Vulnerability Management Program

Calculating the ROI of a Vulnerability Management Program #outlook a{ padding:0; }...

Latest article

Attackers Are Quick to Exploit vBulletin’s Latest 0-day Remote Code Execution Vulnerability

Imperva’s Cloud WAF has identified instances of a new 0-day vulnerability being exploited within a matter of hours of the exploit being published. On Monday...

Ransomware: two pieces of good news

“All your files have been encrypted.” How many times has this suddenly popped up on your screen? We hope never, because it’s one of...

A Leader in the 2019 Gartner Magic Quadrant for WAF, Six Years Running

Gartner has published its 2019 Gartner Magic Quadrant for Web Application Firewalls (WAF) and Imperva has been named a Leader for the sixth consecutive...