Blog
To VPN or Not to VPN?
by siteadmin | Oct 27, 2020 | Network Security, User Security
Over the past few years, VPN vulnerabilities have been in the spotlight and talked about everywhere. There is always some vulnerability being abused...
Imperva’s Mobile Security App
by siteadmin | Oct 27, 2020 | Mobile Security
How many apps do you currently have on your mobile device? Is this number a total across both your personal and professional devices? Did you know...
Multi-Vendor Firewall Change Tracker for Network Security Admins
by siteadmin | Oct 27, 2020 | Network Security
As the spread of COVID-19 is forcing employees to work remotely, it’s put an unprecedented strain on organizations’ network and security teams, a...
Zero Trust Architecture: Best Practices for Safer Networks
by siteadmin | Oct 27, 2020 | Data Security, Network Security, User Security
A zero trust architecture enables organizations to prioritize access and restrictions. The goal is to implement a zero trust policy across all...
Monitoring 802.1X EAP: What You Need to Know
by siteadmin | Oct 27, 2020 | Network Security
First Thing’s First As we’ve written about previously, the standard authentication protocol used on encrypted networks is Extensible Authentication...
Multi-factor authentication offers effective security, but not all solutions are created equal
by siteadmin | Oct 27, 2020 | Cloud Security, User Security
Reports published by Proofpoint recently documenting MFA vulnerabilities in Microsoft 365 (Office 365) have likely caused concern among Microsoft...
Increase SSO security by going passwordless
by siteadmin | Oct 27, 2020 | Cloud Security, User Security
The acceleration of digital transformation initiatives to support the remote workforce has, in turn, sped up the development of cloud-based...
5 Best Practices for Securing Privileged Access and Identities for the Cloud Management Console
by siteadmin | Oct 27, 2020 | Cloud Security, User Security
Over the next few weeks, we’ll explore best practices for securing privileged accounts and identities in common cloud scenarios. This series can...
AI email security: Understanding the human behind the keyboard
by siteadmin | Oct 27, 2020 | User Security
At the heart of any email attack is the goal of moving the recipient to engage: whether that’s clicking a link, filling in a form, or opening an...
Notice the unnoticed: Threat Hunting by SandBlast Agent
by siteadmin | Oct 27, 2020 | User Security
By Yaelle Harel and Boaz Barzel Threat Hunting is a proactive approach for finding and remediating undetected cyber-attacks. It is a process that...
Avoid Alert Fatigue: How to Automatically Get Rid of WAF False Positive
by siteadmin | Oct 27, 2020 | Application Security, Data Security
Alert fatigue – introducing false positives in WAF All WAF experts know what it’s like handling massive amounts of alerts. They’re also very likely...
How AI detected a hacker hiding in an energy grid within hours of deployment
by siteadmin | Oct 27, 2020 | Network Security
A cyber-criminal had already made the first steps of a critical intrusion at a European energy organization when the company deployed AI for cyber...
Cloud-sourcing: Using Global Threat Intelligence to Instantly Protect Your Cloud Assets
by siteadmin | Oct 26, 2020 | Cloud Security
By Jonathan Maresky, CloudGuard Product Marketing Manager, published October 21, 2020 When it comes to security in the cloud, companies face...
Imperva A Seven-Time Magic Quadrant Leader and Named Highest for Completeness of Vision for WAF
by siteadmin | Oct 26, 2020 | Application Security
Gartner has published its 2020 Gartner Magic Quadrant for Web Application Firewalls (WAF) and Imperva has been named a Leader for the seventh...
DataCenter Security Event
by siteadmin | Sep 18, 2020 | Events
Data centre security broadly refers to the array of technologies and practices used to protect a facility’s physical infrastructure and network...
Case Study
by siteadmin | Sep 2, 2020 | Case Studies
Coming soon