Latest from Imperva

The Proactive CISO’s Playbook: How to close the Exposure Gap and Manage Cyber Risk with Confidence

Trend Micro’s “The Proactive CISO’s Playbook” guides CISOs in shifting from reactive security to strategic leadership. It emphasizes incident readiness, cross-functional collaboration, and continuous improvement. By adopting a proactive, assume-breach mindset, CISOs can build resilient organizations, foster transparency, and drive board-level engagement in cybersecurity.

Read →

The 2024 Attack Intelligence Report

This report presents data and insights that security practitioners can use to better understand and guard against some of the most significant attacks and TTPs occurring in today’s cyber threat landscape. By examining recent notable vulnerabilities and high-impact attacks, the experts of Rapid7 Labs identify trends and add valuable context so you can command your […]

Read →

A Guide to RASP

Before RASP entered the security market, the industry’s offerings provided protections on the network layer and on the host, but lacked active protection at the application layer. With the exception of a WAF, there were no production environment protections to provide controls at runtime. And with 30+ technologies and growing, the application security space isn’t […]

Read →

Cyber Security and Compliance Guide for Financial Services

The financial services industry is a high-value target for cyber criminals, and securing sensitive data, such as customer transactions, account information, private personal data, is a significant challenge. In addition, online banking applications, multi-channel customer services are critical for revenue growth. Yet they also expand the attack surface, giving cyber criminals additional avenues to steal […]

Read →

Best Practices in Buying Down Risk

Traditional approaches fall short when attempting to buy down risk in an ever-changing environment. Conflicting requirements of speed, convenience and security battle with one another as organizations seek to embrace digital transformation. This whitepaper focuses on defense-in-depth, a framework that is at the heart of buying down risk. It shows how multiple layers of defense, […]

Read →

Application Security in an Open Source World

Open-source and third-party software offer tremendous benefits and thus are pervasive across enterprise applications. However, this code also carries vulnerabilities and risk. Imperva offers the industry’s leading Runtime Application Self-Protection (RASP) solution, protecting critical applications that use open source and third-party software against known and zero-day attacks, in minutes, without changing a line of code. […]

Read →

Five Steps to Mitigating Data Breach Risks

Traditional security approaches, such as perimeter-based and role-based security, tend to lockdown everything by default, which limits legitimate data usage and frustrates business users. Above all, they cannot stop data breaches. Businesses need to embrace risk assessment approach and security must become data-centric. This whitepaper provides a security framework to help you mitigate data breach […]

Read →

The Road to Compliance: Steps for Securing Data to Comply with the GDPR

Financial institutions are well-versed in privacy, data compliance, and the oversight mandated by the sector’s regulators. As a result, they have navigated the GDPR waters more skillfully than other industries. However, regulatory compliance becomes more challenging for financial institutions as they strengthen their overall security posture at the same time. The “Steps for Securing Data […]

Read →

A Buydown for Risk: Why Data Security is a Must

Investments in edge security (end-point and network), continues to grow. Core security (identity management), grows more slowly, but is still a well-established, multibillion-dollar business. A third area of activity, namely data security, is by comparison relatively neglected. Read this white paper to learn why protecting the data itself must be the central pillar of enterprise […]

Read →

2019 Cyberthreat Defense Report

Cybersecurity grows more complicated for financial institutions as they strive to protect growing amounts of sensitive customer and financial data that is stored in hybrid environments. CyberEdge Group surveyed 1,200 security professionals around the globe, from 19 industries, including the financial services sector. According to its “2019 Cyberthreat Defense Report,” security analytics is the most-wanted […]

Read →

The Imperva Incapsula DDoS Response Playbook

Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights