You searched for Imperva/ | SC Media

Your search for Imperva/ returned 22 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Features remove

Your search for Imperva/ returned 22 results

Sort Results:

Relevant Recent
Ransomware

Alive and Kickin’

Do you remember where you were the day ransomware died? Me neither. Because, of course, it didn’t. But right about mid-2015, many of us were donning our finest, combing our hair and shining our shoes in preparation for the funeral of one of cybersecurity’s biggest menaces. And then 2016 blew in with a vengeance. And…
Cybercrime: Narrowing the gap
Features

Cybercrime: Narrowing the gap

The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates and how the good guys are closing in.
Lock the front door
Features

Lock the front door

Servers hosting trusted sites are prime targets for attackers who want to prey on user PCs and steal data, reports Jack Rogers.
Features

Women to Watch 2018

Jen BrownCompliance and data protection officer, Sumo Logic Jen Brown is the compliance and data protection officer at Sumo Logic where she is responsible for responsible for leading compliance, risk, and privacy efforts for the company. She has more than 20 years of experience in IT security and compliance and has worked as a consultant, external…
EXIT strategy: Insider threat
Features

EXIT strategy: Insider threat

Threats from inside an organization - and from third-parties - pose a burgeoning challenge for security professionals, reports Jim Romeo.
Guarding the crown jewels: Critical data
Features

Guarding the crown jewels: Critical data

The loss of personally identifiable information (PII) by an organization can lead to customer loss, reputational harm, and fines, but before this data can be properly guarded, it must be located.
Security News

Ten ways to counterattack

Enterprise database infrastructures, which often contain the crown jewels of an organization, are subject to a wide range of attacks. The most critical of these are listed below, followed by recommendations for mitigating the risk of each.
Next post in Women In Security 2017