Does your security solution protect against GDPR non-compliance?

Despite a seemingly complete overhaul of data security and privacy as the General Data Protection Regulation rolled out, many fall short when it comes to screening for compliance. How do you protect your organization, your clients and your customers? A… Continue reading Does your security solution protect against GDPR non-compliance?

Clustering App Attacks with Machine Learning (Part 2): Calculating Distance

In our previous post in this series we discussed our motivation to cluster attacks on apps, the data we used and how we enriched it by extracting more meaningful features out of the raw data. We talked about the many features that can be extracted from… Continue reading Clustering App Attacks with Machine Learning (Part 2): Calculating Distance

Clustering App Attacks with Machine Learning Part 1: A Walk Outside the Lab

A lot of research has been done on clustering attacks of different types using machine learning algorithms with high rates of success. Much of it from the comfort of a research lab, with specific datasets and no performance limitations. At Imperva, our… Continue reading Clustering App Attacks with Machine Learning Part 1: A Walk Outside the Lab

Mobile security: Enterprise data via mobile is the next frontier for cyber criminals

2018 will be the year cyber criminals focus on enterprise mobile security weak spots, exploiting them to harvest sensitive information. All organizations face new security challenges as their workers increasingly go mobile and use a rapidly e… Continue reading Mobile security: Enterprise data via mobile is the next frontier for cyber criminals

RSA App Exposes User Data Due to Common Developer Mistake

Late last week security researchers found the RSA security conference exposing conference attendee data via vulnerabilities in its mobile app. Because a 3rd party developer had hard coded data – including security keys and passwords – in th… Continue reading RSA App Exposes User Data Due to Common Developer Mistake

Making the Grade: Achieve SSL Labs A+ Grade with Imperva WAF

In this blog post, we’ll go over how to elevate your web server SSL/TLS implementation, why it’s important, and how you can leverage our version 13.0 release for Imperva SecureSphere Web Application Firewall (WAF), available today, to achieve the desir… Continue reading Making the Grade: Achieve SSL Labs A+ Grade with Imperva WAF

RedisWannaMine Unveiled: New Cryptojacking Attack Powered by Redis and NSA Exploits

Recently cryptojacking attacks have been spreading like wildfire. This week we saw a new generation of cryptojacking attacks aimed at both database servers and application servers. We dubbed one of these attacks RedisWannaMine. Read on.
The post R… Continue reading RedisWannaMine Unveiled: New Cryptojacking Attack Powered by Redis and NSA Exploits

Pause for a Sec: Initiating Cultural Change for SecDevOps

SecDevOps requires an organizationwide cultural shift that holds everyone responsible for security and redefines the development team’s role in properly securing applications from the start.

The post Pause for a Sec: Initiating Cultural Change for SecDevOps appeared first on Security Intelligence.

Continue reading Pause for a Sec: Initiating Cultural Change for SecDevOps