1 to 10 of 27
Sort by

API Security - Discover and Protect your API Surface

Did you know that API abuse is the main data breach vector? Did you know that the majority of organizations do not have a detailed inventory of APIs and the data exposed by these APIs? In this session, @Ziv Lachish and @Lebin Cheng demonstrate how you can leverage Imperva’s API Security to...

 10-20-2021 | 16:00 - 17:00 GMT

Discussion Thread 2
Benefits of API Security

Blog Entry
Imperva Product Design – Building a Universe - Webinar

pic found here: Join the next Imperva Community Webinar as @Kunal Anand, Chief Technology Officer and @Lior Atzmon, Head of Product Design take us through a brand new experience that pulls together security, performance, reliability, and other...

Blog Entry
Application Security - Ask Me Anything - Imperva Community Live Webinar

Application Security - Ask Me Anything - Imperva Community Live During this AMA the team will be sharing their unique insights on working behind the scenes at Imperva, including discussing how Imperva finds and manages new threats, sharing some of their best practices and tips to...

Blog Entry
How to Monitor Access to Sensitive Data Through Applications and APIs - Community Webinar

image found here: In the midst of the largest innovation and modernization efforts in recent history, organizations who both store and process sensitive data are faced the challenge of auditing and monitoring “who” is accessing that data, along...

Blog Entry
Enforcing API Schema Specifications in Imperva

Space pic... APIs are designed to expose certain functionality to be used by automated programs. An API’s schema serves as a “contract” for how an API’s clients should interact with an API making it a valuable tool to an organization’s customers. Unfortunately, this usefulness also makes...

Blog Entry
Securing API's Part 2 Mitigating Input Validation Vulnerabilities Community Webinar

API Security APIs play a critical role in empowering the digital economy…but since apps are being churned out faster than security teams can secure them, businesses are exposed on a massive -- and growing -- attack field. In the second part of our series on Securing API's, we're...