You searched for Imperva/ | SC Media

Your search for Imperva/ returned 15 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Events remove

Your search for Imperva/ returned 15 results

Sort Results:

Relevant Recent
Reboot Leadership Awards 2019

Ben Herzberg – Imperva

Why Nominated: Under Ben Herzberg’s leadership, Imperva’s threat research team has uncovered key vulnerabilities in Facebook, Google Photos, Drupal and other online services and platforms. Profile: Herzberg and his Imperva research team are charged with identifying and evaluating software flaws that undermine application and data security. In November 2018, Imperva disclosed a significant Facebook vulnerability that…
Reboot Leadership Awards 2018

Rising Star – Luda Lazar

Category: Rising Star Name: Luda Lazar Title: Security Research Engineer Company: Imperva Why nominated: Luda Lazar is one of Imperva’s top security researchers. As such, she uses her wide technological skills in reverse engineering, coding and threat analysis to uncover new cyberattacks and design security solutions. Profile: Lazar has been with Imperva since 2011, starting out in…
Reboot Leadership Awards 2018

Top Management – Roy Katmor

Category: Top Management Name: Roy Katmor Title: Co-founder and CEO Company: enSilo  Why nominated: Known as a do-it-yourself master who enjoys fixing everything from cars to homes, enSilo CEO Roy Katmor is now trying to fix endpoint security. Profile: Katmor co-founded enSilo three years ago with a vision to secure data at the most fundamental level in order to…
Reboot Leadership Awards 2018

Influencer – Amichai Shulman

Category: Influencer Name: Amichai Shulman Title: Researcher, Entrepreneur, Investor Why Nominated: Shulman has gained his expert reputation by staying at the leading edge of security research and mentoring security teams, developers and entrepreneurs in the security industry. Founding Imperva in 2002, Amichai was at the forefront of the cybersecurity industry and had a strong hand…
Top 5 Security Threats to Watch for in the Coming Year
Vendor Webcasts

Stop Threats and Data Breaches at the Source. New CPE credit opportunity!

Wednesday, Mar. 30th 2011 - Every day information security analysts battle a technically competent and motivated adversary determined to harm their organizations. Join our webcast to understand the tactics used by hackers and malicious insiders as they try to extract confidential data without authorization. You will also learn how to achieve complete visibility across your organization with SIEM, and how a focus on User Monitoring, Database Activity Monitoring and File Monitoring can stop these adversaries in their tracks.
SC Awards 2017 finalists
2017 SC Awards Finalists

SC Awards Finalists 2017 Round Two

TRUST AWARDS Best Cloud Computing Security SolutionThese technologies are deployed to protect data and/or applications in a cloud environment. They may also protect the cloud computing infrastructure itself. Cloud computing security concerns are numerous for both providers and their customers – and include security and privacy worries, compliance issues and legal/contractual problems. Solutions or services…
Editorial Webcasts

Remediate before it’s too late

With mega breaches springing up one after another, many industry players have registered both disbelief and awe at the sheer numbers of individual credentials stolen.
2013 SC Magazine US Awards Finalists

2013 SC Awards US Finalists: Round Five

Round five includes finalists in categories for best database security solution, IPsec/SSL VPN, SIEM appliance, security company, company of the year, and cyber security higher education program.
Next post in Events