Modern Database Security Buys Down More Risks for Enterprises

Pop quiz: how many data records are lost or stolen on an average day? 1 million? 3 million? 6 million? If you answered 6 million, you’re correct, according to the Breach Level Index. According to the Index, 14.7 billion records have been lost or stolen since 2013, or more than 2.2 billion per year. When […]
The post Modern Database Security Buys Down More Risks for Enterprises appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/KSn8X4S4pZ0/

Cloud WAAPs Are the Future of Application Security. But What Does That Mean?

Millions of Verizon FIOS broadband users vulnerable to hackers controlling and surveilling their home networks. Thousands of GPS watches whose maps were open to attackers tracking and eavesdropping on children and elderly users. A zero-day hole in Microsoft’s Edge and Internet Explorer browsers that could reveal usernames and passwords. What’s the common denominator for these […]
The post Cloud WAAPs Are the Future of Application Security. But What Does That Mean? appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/dmHRv2Gu1ok/

Developers Versus Automation Engineers: How We Ended the Fighting with the Right CI Process

Hey developers and DevOps professionals: what if I told you that how you wrap and execute your automation tests could be the key to making your development process faster, more professional and stable, and stop the bickering between your developers and automation teams? This post will describe how we, the Automation team, created a new […]
The post Developers Versus Automation Engineers: How We Ended the Fighting with the Right CI Process appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/ljicxSpRD3c/

The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack

DDoS attacks have always been a major threat to network infrastructure and web applications. Attackers are always creating new ways to exploit legitimate services for malicious purposes, forcing us to constantly research DDoS attacks in our CDN to build advanced mitigations. We recently investigated a DDoS attack which was generated mainly from users in Asia. […]
The post The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/vvkBU_z3MpA/

Enhance Imperva Cloud WAF with a New Management Tool in the Imperva GitHub

Imperva recently launched the Imperva GitHub where our global community can access tools, code repositories and other neat resources that aid collaboration and streamline development. The nice thing about these tools is that you can clone them and customize them with whatever functionality you need. If you are nice you can also push new capabilities […]
The post Enhance Imperva Cloud WAF with a New Management Tool in the Imperva GitHub appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/F7MGtGdHHpk/

The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

For those of us in the security industry, the annual Cyberthreat Defense Report is a gold mine of insights into the minds of IT security professionals, including what threats keep them up at night, and how they plan to defend against them. The 6th edition of the report from the CyberEdge Group was just published. […]
The post The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic] appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/bOcxQFomwJI/

Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs

This guide gives step-by-step guidance on how to collect and parse Imperva Cloud Web Application Firewall (WAF, formerly Incapsula) logs into the Graylog SIEM tool. Read Part I to learn how to set up a Graylog server in AWS and integrate with Imperva Cloud WAF. This guide assumes: You have a clean Graylog server up […]
The post Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/qU1l2a3nAy0/

Now-Patched Google Photos Vulnerability Let Hackers Track Your Friends and Location History

A now-patched vulnerability in the web version of Google Photos allowed  malicious websites to expose where, when, and with whom your photos were taken. Background One trillion photos were taken in 2018. With image quality and file size increasing, it’s obvious why more and more people choose to host their photos on services like iCloud, […]
The post Now-Patched Google Photos Vulnerability Let Hackers Track Your Friends and Location History appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/_RXLkA6k_as/

How Our Threat Analytics Multi-Region Data Lake on AWS Stores More, Slashes Costs

Data is the lifeblood of digital businesses, and a key competitive advantage. The question is: how can you store your data cost-efficiently, access it quickly, while abiding by privacy laws? At Imperva, we wanted to store our data for long-term access. Databases would’ve cost too much in disk and memory, especially since we didn’t know […]
The post How Our Threat Analytics Multi-Region Data Lake on AWS Stores More, Slashes Costs appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/0WO62f69Eys/

How to Deploy a Graylog SIEM Server in AWS and Integrate with Imperva Cloud WAF

Security Information and Event Management (SIEM) products provide real-time analysis of security alerts generated by security solutions such as Imperva Cloud Web Application Firewall (WAF). Many organizations implement a SIEM solution to bring visibility of all security events from various solutions and to have the ability to search them or create their own dashboard. Note […]
The post How to Deploy a Graylog SIEM Server in AWS and Integrate with Imperva Cloud WAF appeared first on Blog.

Link: http://feedproxy.google.com/~r/Imperviews/~3/gIxPmGKk-Cg/