Imperva and the Secure by Design Pledge: A Commitment to Cybersecurity Excellence

The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a voluntary “Secure by Design Pledge” for enterprise software manufacturers, focusing on improving the security of their products and services. This pledge outlines ...
Above & Beyond - Sun In Your Eyes

Meet Andy Zollo, SVP of APJ Sales

| | imperva
Andy Zollo, who led the Imperva business in EMEA, relocated to Singapore in October to be Senior Vice President of Sales for the combined Imperva and Thales CPL businesses in the APJ ...

Modernizing Data Security: Imperva and IBM zSystems in Action

As data security continues to evolve, businesses require solutions that scale to modern environments. Imperva and IBM zSystems have partnered to deliver a comprehensive approach to securing data within IBM z/OS environments ...
Screenshot 2024 10 18 at 10.51.18

ShadyShader: Crashing Apple M-Series Devices with a Single Click

Introduction A while ago, we discovered an interesting vulnerability in Apple’s M-series chips that allowed us to freeze and crash Apple devices by exploiting a flaw in the GPU’s driver. This vulnerability, ...

Imperva Adaptive Threshold for Layer 7 DDoS Attacks Reduces Risk of Business Disruption

Today’s fast-paced digital landscape demands an optimized user experience that is always available to engage end users. However, businesses are constantly under threat from a variety of attacks that seek to disrupt ...
Image 1 Trust Sign

Cursor’s Magic Comes with a Catch: The Trust Setting You’re Missing

Occasionally, a new AI tool emerges unexpectedly and dominates the conversation on social media. This time, that tool is Cursor, an AI coding platform that’s making waves for simplifying app development with advanced ...

Enhancing Security and Compliance in the Energy Sector: Imperva’s Cipher Suite Support

In the energy and utility sector, safeguarding data and ensuring compliance with regulatory standards is paramount. With the increasing digitalization of operations, from smart grids to IoT-enabled devices, the need for robust ...

My Journey To CTO for Imperva App Sec

| | Application Security, imperva
I’m delighted to be announcing that I’ve joined Imperva as the CTO for Application Security. Many of you readers know me as the Forrester analyst covering Zero Trust, SASE, and network security ...
Figure 1 GraphIQ

GraphQL Vulnerabilities and Common Attacks: Seen in the Wild

In our previous blog, we provided an overview of GraphQL security, along with details and examples of common attacks. Building on that foundation, this blog will take a closer look at real-world ...
Figure 1 Requests by Client

How Cyberthreats Could Disrupt the Olympics

Introduction Cybersecurity experts are on high alert, as the 2024 Olympic Games continue over the coming weeks. Historically, the Olympics have been a prime target for cybercriminals, state-sponsored actors, and hacktivists. The ...