2014 Gartner Magic Quadrant for Web Application Firewalls

Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the...
0 comment

Web Application Firewalls Are Worth the Investment for Enterprises

Firewalls and intrusion prevention systems don’t provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web...
0 comment

Website Security Threat Report Part 2

These resources have offered unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s...
0 comment

5 Ways to Build Trust with Customers

With consumers facing a steady stream of news reports about corporate data breaches, major retailers hacked for credit card information, nation-state–sponsored cyber attacks, and the Heartbleed Bug...
0 comment

Ensuring Compliance in the Asia Pacific Region with SSL Certificates

For those doing business in Australia, New Zealand, Singapore, or in other parts of the Asia Pacific region, privacy is a significant concern. Businesses holding personal data have a responsibility to...
0 comment

Mitigating Risks of Cloud Computing with SSL Certificates

Businesses are increasingly turning to cloud computing for flexibility, cost savings, and a new range of services offered by cloud vendors. The users of cloud computing services and cloud vendors have...
0 comment

Does Application Security Pay? Measuring the Business Impact of Software Security Assurance Solutions

With the escalating number and increasing sophistication of cyber-attacks, perimeter defenses are no longer enough. Enterprises must ensure application vulnerabilities don?t open doors for hackers. Mainstay...
0 comment

Cyber Risk Executive Summary

The “Cyber risk report 2013 Executive summary” presents the major findings of HP Security Research’s comprehensive dive into today’s cyber vulnerability and threat landscape. It...
0 comment

Seven Steps to Security

After a decade of news detailing countless successful cyber-attacks, it’s hard to imagine a corporation not understanding the need for a software security solution. However, the task of building...
0 comment

Reducing Risks from Open Source

Open source software is a game-changer in helping development organization herd their application security risks. But they can also introduce risk when employed without adequate precautions. However,...
0 comment