Introducing Imperva Cloud Data Security!
We at Imperva are gearing up for the inaugural AWS re:Inforce event on June 25th and 26th in Boston, Massachusetts, where technical leaders will converge for security, identity, and compliance learning and community building. Imperva experts will be on hand this week in booth 827 on the exhibit floor to meet with our valued customers and those new to...
Centrify Closes Out a Busy June at AWS Re:Inforce and Identiverse
June has been a busy month in the cybersecurity space! It started off with InfoSec Europe and SailPoint Navigate, next week we’ll wrap up the month with AWS Re:Inforce – Amazon’s inaugural security-focused event – and Identiverse – the premier identity industry event. That’s a lot!
We love these opportunities to come together with our friends, partners, and colleagues and...
Not-so-dear subscribers
Many people have had a run-in with subscriptions to mobile content providers. They appear out of the blue, and get discovered only when account funds run dry. It might seem that the obvious solution is not to visit dubious sites and not to install apps from third-party sources. But, alas, these days such advice is clearly not enough. We...
UK’s Largest Mobile Carrier Relies on AWS and Imperva FlexProtect for Web Delivery and 360-Degree Application Protection
In today’s highly-competitive telecommunications market, the website is integral to successful and fast customer service. Downtime due to intrusion, data breach, or DDoS attack is intolerable.
It’s why ten of the largest global telecommunications providers have chosen Imperva, including BT mobile subsidiary, EE.With nearly 30 million subscribers, EE, as part of its parent division BT Consumer, is the largest mobile...
Minimizing Exposure to Ransomware Attacks with Centrify Zero Trust Privilege
Ransomware attacks like the ones that wreaked havoc in Baltimore, Maryland, Albany, New York, and Genesee County, Michigan are dominating the headlines in 2019. Holding someone or something for ransom is a simple yet effective strategy that has been used by criminals for many years. Today, cyber criminals are applying these ancient techniques to modern technologies. This raises issues...
Every Second Counts When You’re Under Attack — Imperva Provides 3 Second DDoS Mitigation, Stops Account Takeovers & Protects your APIs
Let’s be blunt: cybersecurity is a never-ending arms race between bad actors and IT and security teams. Lately, attackers have surged. Armed with powerful, inexpensive hacking tools and deep knowledge gleaned from successful breaches, attackers are organizing sprawling botnets, probing soft targets such as website logins, and hammering web applications with DDoS attacks of unprecedented ferocity.
The attackers haven’t just...
Plurox: Modular backdoor
In February this year, a curious backdoor passed across our virtual desk. The analysis showed the malware to have a few quite unpleasant features. It can spread itself over a local network via an exploit, provide access to the attacked network, and install miners and other malicious software on victim computers. What’s more, the backdoor is modular, which means...