Log Management for Government Buyer’s Guide

Log Management for Government Buyer's Guide #outlook a{ padding:0; } body{ width:100%...

DevOps Buyer’s Guide

DevOps Buyer's Guide #outlook a{ padding:0; } body{ width:100% !important; } .ReadMsgBody{...

Defending Critical Infrastructure against Cyber Attacks

Defending Critical Infrastructure against Cyber Attacks #outlook a{ padding:0; } body{ width:100%...

MITRE ATT&CK Matrix with CIS Controls and Tripwire mapping

MITRE ATT&CK Matrix with CIS Controls and Tripwire mapping #outlook a{ padding:0;...

Threat Prevention is Foundational

Threat Prevention is Foundational #outlook a{ padding:0; } body{ width:100% !important; }...

Electronic Health Record Systems Under Attack

Electronic Health Record Systems Under Attack #outlook a{ padding:0; } body{ width:100%...

Jumpstarting Your Cyberdefense Machine with CIS Controls V7

Jumpstarting Your Cyberdefense Machine with CIS Controls V7 #outlook a{ padding:0; }...

Securing the Entire Container Stack, Lifecycle and Pipeline

Securing the Entire Container Stack, Lifecycle and Pipeline #outlook a{ padding:0; }...

Latest article

Attackers Are Quick to Exploit vBulletin’s Latest 0-day Remote Code Execution Vulnerability

Imperva’s Cloud WAF has identified instances of a new 0-day vulnerability being exploited within a matter of hours of the exploit being published. On Monday...

Ransomware: two pieces of good news

“All your files have been encrypted.” How many times has this suddenly popped up on your screen? We hope never, because it’s one of...

A Leader in the 2019 Gartner Magic Quadrant for WAF, Six Years Running

Gartner has published its 2019 Gartner Magic Quadrant for Web Application Firewalls (WAF) and Imperva has been named a Leader for the sixth consecutive...