All Research Sponsored By:Imperva

-
Web Application Firewalls Are Worth the Investment for Enterprises
This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
-
How to Leverage Free Tools to Secure Web Apps
Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
-
Software Security for Web Developers: Providing a Helping Hand
This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
-
Your Personal Web Attack Survival Guide
This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Cutting the Cost of Application Security
This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
-
The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
This guide takes a look at 10 things that every web application firewall should provide.
-
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
-
Imperva's Web Application Attack Report
Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
-
Imperva’s Web Application Attack Report
Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
-
Death and Taxes...and Hackers
View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
-
Botnets at the Gate: Stopping Botnets and Distributed Denial of Service Attacks
This paper attempts to lift the veil on botnets and the cyber-criminals behind them. It analyzes the history, growth, and economics behind botnets. It then investigates one of the most common attacks executed by botnets: the Distributed Denial of Service (DDoS) attack.
-
Database Security Audit and Protect Critical Databases
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
-
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
-
Database Security: Audit and Protect Critical Databases
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
-
File Security: Audit and Protect Critical Files
Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
-
The Anatomy of a Cross-Site Scripting Campaign
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
-
Technology Audit: Imperva SecureSphere Data Security Suite
Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
-
Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA
Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.
-
Anatomy of a Database Attack
Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
-
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it.
-
Database Crime Scene Prevention
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.
-
Importance of Web Application Firewall Technology for Protecting Web-based Resources
ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.
-
The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere
Read this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.