Hi [[ session.user.profile.firstName ]]

Imperva Incapsula

  • Date
  • Rating
  • Views
  • Securing the Cryptocurrency Exchange
    Securing the Cryptocurrency Exchange
    Jonathan Gruber – Security Engineer, Imperva and Tal Stern - Enterprise Security Expert, Imperva Recorded: Jun 14 2018 59 mins
    Securing the Cryptocurrency Exchange: Ensuring Protection, Availability, and Performance

    Now, more than ever, cryptocurrency exchanges are facing security threats in the form of volumetric, application layer, DDoS, and account takeover (ATO) attacks. Although the success of cryptocurrency exchanges makes them especially attractive to cybercriminals, attacks of late are taking exchanges by surprise, and they are often not scaled or have not built a secure environment. In this webinar, join Security Engineer Jonathan Gruber and Enterprise Security Expert Tal Stern from Imperva as they explore the latest cryptocurrency exchange vulnerabilities and attacks and explain the best strategies for mitigation.
  • Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report
    Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report
    Mark Bouchard, COO, CyberEdge Group and Sara Pan, Sr. Product Marketing Manager, Imperva Recorded: Apr 25 2018 58 mins
    With more companies moving their data and apps to the cloud, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of your peers? In this live webinar, CyberEdge and Imperva will discuss the extent cybersecurity solutions are deployed in the cloud, on-premises or hybrid and other key insights from the 2018 Cyberthreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How are my peers thinking differently about cyberthreats and the options for defending against them?
    •How does our security spend compare to other organizations?
    •Which security technologies should we be investing in next?
  • Protect Your Web Applications from Cryptomining
    Protect Your Web Applications from Cryptomining
    Gilad Yehudai – Security Researcher, Imperva and Nadav Avital – Threat Research Team Leader, Imperva Recorded: Mar 28 2018 44 mins
    Protect Your Web Applications from Cryptomining: The New Force Behind Remote Code Execution Attacks

    Remote code execution (RCE) attacks involving cryptomining malware are gaining momentum. They've become attackers' new favorite way to exploit vulnerabilities in web application source code and are prevalent in over 88% of all RCE attacks. In this webinar, join Security Researcher Gilad Yehudai and Threat Research Team Leader Nadav Avital as they analyze malicious cryptomining script, investigate methods these attackers use to make money, and explain how Imperva WAF solutions are equipped to mitigate the threat.
  • Fighting Cybercrime: Seven Popular DDoS Myths Debunked
    Fighting Cybercrime: Seven Popular DDoS Myths Debunked
    Dima Bekerman, Security Research Specialist, Imperva Incapsula Recorded: Mar 21 2018 29 mins
    DDoS attacks can be damaging; especially for an online business that depends on valuable client relationships and reliable user experiences. But business organizations aren’t the only targets of malicious web bots. Banking institutions, governments, hospitals and schools have all suffered from debilitating attacks in the past few years.

    There are still a lot of misconceptions when it comes to DDoS attacks. We take some of the most common ones and address misleading information. One thing is certain: Knowing the facts will help you keep your website safe.
  • Part 1: March of the Bots: How to Deal with the Onslaught
    Part 1: March of the Bots: How to Deal with the Onslaught
    Dvir Shapira, Dir. Prod mgmt, Imperva; Robert Hamilton, Dir, prod mktg, Imperva; Brandon Dunlap (Moderator) Recorded: Mar 7 2018 60 mins
    Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers.

    Impreva will share data gathered from their security research team about the most recent bot trends, how bot traffic is changing, where it’s coming from, and the top actions you should be taking to mitigate the effects of bad bots on your websites. Join us for Part 1 of a 3 Part Security Briefings series and understand how commercial services take a multi-layer approach to bot mitigation and management and whether one of these services may be appropriate for you.
  • API Endpoints: The New DDoS Attack Vector for Cybercriminals
    API Endpoints: The New DDoS Attack Vector for Cybercriminals
    Andy Shoemaker, Founder, NimbosDDOS and Kim Lambert, Incapsula Sr. Product Marketing Manager, Imperva Recorded: Jan 24 2018 46 mins
    Do you believe your APIs are adequately protected? Many modern applications (including mobile) leverage public APIs for communication, but these public APIs are often poorly protected against DDoS attacks because of adverse interactions with the communication stream. Join DDoS testing expert and NimbusDDOS founder Andy Shoemaker as he delves into the challenges of protecting API endpoints and what you can do to make sure your APIs are truly secure.

    In this webinar you will:
    1.Hear why attacks on API endpoints can be so devastating
    2. Learn why common mitigation approaches fail (CAPTCHAs, other challenge-response tests)
    3. Discover ways to protect apps by securing APIs
    4. See a live demo of a Layer 7 attack against an API
  • DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems
    DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems
    Andy Shoemaker, Founder, NimbusDDOS & Kim Lambert, Sr. Product Marketing Manager, Imperva Incapsula Recorded: Jan 18 2018 47 mins
    Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.

    In this webinar you will:
    · Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
    · Watch a live DDoS attack from the attacker's perspective
    · Participate in a live Q&A with DDoS experts
  • Live Attack: Winning the Battle Against E-Commerce Site Scrapers with Incapsula
    Live Attack: Winning the Battle Against E-Commerce Site Scrapers with Incapsula
    Jonathan Gruber, Incapsula Security Engineer, Imperva and Danny Milshtein, Incapsula Security Engineer, Imperva Recorded: Dec 6 2017 45 mins
    Are you relying on identification methods like CAPTCHAs to protect your critical assets from price scraping and content theft? Join Imperva Security Engineers Jonathan Gruber and Danny Milshtein to uncover the limitations of common security measures. In this webinar, they’ll demo how Incapsula goes beyond standard threat intelligence to protect your site from malicious site scrapers.

    In this webinar you will:
    - Understand the bot population and how to identify “good” and “bad” bots
    - Learn how to block or redirect site scrapers
    - See a live demo of the Incapsula bot mitigation security solution
  • Make the Switch to Incapsula: Improve Web Performance and Site Protection
    Make the Switch to Incapsula: Improve Web Performance and Site Protection
    Dvir Shapira, Director, Product Management, Imperva Incapsula, Robert Hamilton Director, Product Marketing, Imperva Incapsula Recorded: Nov 15 2017 35 mins
    If you're using the Akamai platform and it is no longer meeting your company’s need for security and application delivery, try Imperva Incapsula.
    The Incapsula cloud service gives you a single interface that integrates content delivery, website security, DDoS protection, and load balancing. Incapsula is PCI compliant, has customizable security rules and offers 24/7 support. With Incapsula you can deliver applications securely and efficiently.

    Here's what the webinar will demonstrate:
    • Operational advantages and cost savings from a switch to Incapsula
    • How to plan and execute a successful migration from Akamai to Incapsula
    • The differences in functionality between the two platforms
  • Pulse Wave Attacks: The New DDoS Threat to Your Network
    Pulse Wave Attacks: The New DDoS Threat to Your Network
    Avishay Zawoznik, Lead Threat Researcher, and Kim Lambert, Sr. Product Marketing Manager, Imperva Incapsula Recorded: Oct 4 2017 31 mins
    Over the last few months, dedicated security researchers at Imperva Incapsula have witnessed the emergence of a new DDoS assault pattern, which we have come to call a “pulse wave” attack. Join Avishay Zawoznik, Lead Threat Researcher, and Kim Lambert, Incapsula Product and Security Evangelist, as they explore the rationale behind this type of attack, the consequences it can have for your network, and what you should do to make sure your organization is adequately protected.

Embed in website or blog