Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs

This guide gives step-by-step guidance on how to collect and parse Imperva Cloud Web Application Firewall (WAF, formerly Incapsula) logs into the Graylog SIEM tool. Read Part I to learn how to set up a Graylog server in AWS and integrate with Imperva C… Continue reading Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs

Using Application Analytics to Achieve Security at Scale

Are you overwhelmed by the number of security events per day? If so, you are not alone. Alert Fatigue is Leaving You Exposed It is not uncommon for security administrators to receive tens of thousands of security alerts per day, leading to alert fatig… Continue reading Using Application Analytics to Achieve Security at Scale

Read: How To Build Resilient Cloud Configuration Shields

Configurable systems have a high level of flexibility and are better adapted to most customer needs, but their management isn’t a trivial task in complex cloud deployments. The configuration management concept isn’t new and originated in th… Continue reading Read: How To Build Resilient Cloud Configuration Shields

Imperva Python SDK – We’re All Consenting SecOps Here

Managing your WAF can be a complicated task. Custom policies, signatures, application profiles, gateway plugins… there’s a good reason ours is considered the best in the world. Back when security teams were in charge of just a handful of WA… Continue reading Imperva Python SDK – We’re All Consenting SecOps Here

The Catch 22 of Base64: Attacker Dilemma from a Defender Point of View

Web application threats come in different shapes and sizes. These threats mostly stem from web application vulnerabilities, published daily by the vendors themselves or by third-party researchers, followed by vigilant attackers exploiting them. To cove… Continue reading The Catch 22 of Base64: Attacker Dilemma from a Defender Point of View