Search

1 to 10 of 16
Sort by

Blog Entry
Securing Your Data -A Data Centric Approach - Webinar

Data is one of the most valuable assets for contemporary organisations and a growing source of competitive advantage. Over 50% of organisations’ sensitive data is stored in various databases. Learn how to identify and mitigate critical data security risks without compromising the...


Blog Entry
Reducing Cyber Risk with Imperva Data Risk Analytics

Data Security Risk Reduction Data breaches are becoming increasingly common. In many cases, these breaches are carried out by external threat actors that take advantage of web application vulnerabilities or other holes in an organization’s cyber defenses. However, this is not always the...


Blog Entry
How Machine Learning Enables SOC Teams to Reduce Alert Fatigue

Access to good data is essential to cybersecurity. If an organization lacks insight into what is going on on its network, then it can miss indicators of an ongoing attack. In essence, you can only protect against the attacks that you can see. However, many Security Operations Center (SOC)...


Blog Entry
GitHub Tool for Creating Data Risk Analytics Reports

A while back I received input from several customers using Imperva’s Data Risk Analytics product (aka DRA). The input was that they did not currently have an easy way to show to upper management the value of the DRA. It is true that there is no formal functionality that does that, but DRA has...


Blog Entry
Breach Detection: Data Exfiltration

Photo can be found here https://unsplash.com/photos/lFv0V3 2H6s Using Imperva Data Risk Analytics (DRA) to Detect Attempted Data Theft Data breaches are an expensive and increasingly common threat to organizations. As companies collect more rich data sets regarding their users,...


Blog Entry
Breach Detection: Reconnaissance

Using Imperva Data Risk Analytics (DRA) to Identify Data Reconnaissance Efforts A successful data breach can be extremely damaging to any organization. Companies regularly collect data about their customers in the course of doing business, and a failure to properly secure this data against...