You searched for Imperva/ | SC Media

Your search for Imperva/ returned 20 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Feature remove

Your search for Imperva/ returned 20 results

Sort Results:

Relevant Recent
Cybercrime: Narrowing the gap
Features

Cybercrime: Narrowing the gap

The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates and how the good guys are closing in.
Lock the front door
Features

Lock the front door

Servers hosting trusted sites are prime targets for attackers who want to prey on user PCs and steal data, reports Jack Rogers.
EXIT strategy: Insider threat
Features

EXIT strategy: Insider threat

Threats from inside an organization - and from third-parties - pose a burgeoning challenge for security professionals, reports Jim Romeo.
Features

Women to Watch 2018

Jen BrownCompliance and data protection officer, Sumo Logic Jen Brown is the compliance and data protection officer at Sumo Logic where she is responsible for responsible for leading compliance, risk, and privacy efforts for the company. She has more than 20 years of experience in IT security and compliance and has worked as a consultant, external…
Guarding the crown jewels: Critical data
Features

Guarding the crown jewels: Critical data

The loss of personally identifiable information (PII) by an organization can lead to customer loss, reputational harm, and fines, but before this data can be properly guarded, it must be located.
Features

Mobile security dialing up investment dollars

The mobile, wireless world in which we now live has created a shift in the focus of venture capital investments in security technology. Today's investors tend to target technology that directly protects people and information, a marked change from a few years ago when the focus was the protection of corporate computer systems as a whole.
Security News

Ten ways to counterattack

Enterprise database infrastructures, which often contain the crown jewels of an organization, are subject to a wide range of attacks. The most critical of these are listed below, followed by recommendations for mitigating the risk of each.
Next post in Security News