Cybersecurity Is Everyone’s Job

Cybersecurity Is Everyone's Job #outlook a{ padding:0; } body{ width:100% !important; }...

Defense in Depth: 4 Essential Layers of ICS Security

Defense in Depth: 4 Essential Layers of ICS Security #outlook a{ padding:0;...

Is it time to fire your vulnerability management provider?

Is it time to fire your vulnerability management provider? #outlook a{ padding:0;...

Modern Skills for Modern CISOs

Modern Skills for Modern CISOs #outlook a{ padding:0; } body{ width:100% !important;...

DevOps Buyer’s Guide

DevOps Buyer's Guide #outlook a{ padding:0; } body{ width:100% !important; } .ReadMsgBody{...

Five Insights from the Verizon 2018 DBIR

Five Insights from the Verizon 2018 DBIR #outlook a{ padding:0; } body{...

Another Ransomware Variant Strikes Colorado DOT Days after Initial Attack

Posts from The State of Security for 03/02/2018

Five Critical Steps of a Complete Security Risk and Compliance Lifecycle

Five Critical Steps of a Complete Security Risk and Compliance Lifecycle #outlook...

Latest article

Attackers Are Quick to Exploit vBulletin’s Latest 0-day Remote Code Execution Vulnerability

Imperva’s Cloud WAF has identified instances of a new 0-day vulnerability being exploited within a matter of hours of the exploit being published. On Monday...

Ransomware: two pieces of good news

“All your files have been encrypted.” How many times has this suddenly popped up on your screen? We hope never, because it’s one of...

A Leader in the 2019 Gartner Magic Quadrant for WAF, Six Years Running

Gartner has published its 2019 Gartner Magic Quadrant for Web Application Firewalls (WAF) and Imperva has been named a Leader for the sixth consecutive...