This is Veronica Robinson's Typepad Profile.
Join Typepad and start following Veronica Robinson's activity
Veronica Robinson
Recent Activity
Fact Checking Cyber Espionage Tactics in the Jason Bourne Movie (Spoilers)
It would be an understatement to say the new movie Jason Bourne has gone hi-tech with its central theme of cyber warfare, espionage and surveillance. The movie storyline is set in motion because of a... Continue reading
Posted Aug 16, 2016 at Imperva Cyber Security Blog
Comment
0
FBI appointed as cyber Ghostbusters. “Who are you going to call?"
As most Preppers and security experts will tell you, the majority of nations fear a loss of their power grid. Ukraine got a taste of it on December 23, 2015 when Russia allegedly launched a... Continue reading
Posted Aug 12, 2016 at Imperva Cyber Security Blog
Comment
0
Imperva now a three-peat Gartner Magic Quadrant Leader (and get ready the cloud is coming fast)!
Gartner’s 2016 Magic Quadrant(MQ) for Web Application Firewalls(WAF) has been released, and we at Imperva are very proud to be the only vendor in the Leaders quadrant for the third straight year. Chest thumping aside,... Continue reading
Posted Jul 27, 2016 at Imperva Cyber Security Blog
Comment
0
What CIOs Can Do to Ensure Business Continuity and Growth
What role does the CIO play within your organization’s online security strategy? In some organizations IT is seen as a business impediment—the “office of No,” using security risk as a reason to slow down or... Continue reading
Posted Jul 19, 2016 at Imperva Cyber Security Blog
Comment
0
What I Think Gartner’s Approach to Insider Threats is Missing
A recent report by Gartner analysts Anton Chuvakin and Eric Heidt called "Understanding Insider Threats" (May 2016) defines insider threats "as individuals who were deliberate in their theft, misuse or destruction of data or systems.”... Continue reading
Posted May 25, 2016 at Imperva Cyber Security Blog
Comment
0
Buffer Overflow Tutorial: A Brief Overview of an All-Too-Common Vulnerability
As far back as 2003, buffer overflow attacks constituted a full 23% of all identifiable digital vulnerabilities. Today, buffer overflow attacks still pose a substantial threat with last year’s vulnerability – known as “Ghost” –... Continue reading
Posted May 15, 2016 at Imperva Cyber Security Blog
Comment
0
Hackers’ next target? Your W-2 and tax refund.
As if tax season wasn’t stressful enough, Krebs on Security is reporting unprecedented tax fraud this year. As a result, the IRS is taking up to three times longer to review 2015 tax returns compared... Continue reading
Posted Apr 15, 2016 at Imperva Cyber Security Blog
Comment
0
What Are Database Monitoring Tools?
Databases Activity Monitoring (DAM) tools have become widely used by companies that want to provide an added layer of security and protection against malicious attacks. More pointedly, database monitoring tools are critical to meet legal... Continue reading
Posted Apr 11, 2016 at Imperva Cyber Security Blog
Comment
0
Four Database Security Best Practices to Implement Right Now
How safe is your data center? If the average budget allocation is any indication, the prognosis isn’t good. According to the International Data Corporation (IDC), out of $27 billion cumulative worldwide spending on security products,... Continue reading
Posted Apr 7, 2016 at Imperva Cyber Security Blog
Comment
0
Five SQL Best Practices
You hear about it all the time on TV news, print magazines, and online articles … a new breach, a new attack, a new threat, a new vulnerability. However, did you know that over 97... Continue reading
Posted Apr 6, 2016 at Imperva Cyber Security Blog
Comment
0
Insider Threats: How Imperva CounterBreach is winning the war with data context
Insider Threats have been elusive for enterprises to detect and contain given the complex nature of the problem – employees need free access to data to be productive, but they can also put enterprise data... Continue reading
Posted Mar 31, 2016 at Imperva Cyber Security Blog
Comment
0
The WAAR on Web Apps: Key Findings from our 2015 Web Application Attack Report
2015 was the sixth year in a row that we released our Web Application Attack Report, known affectionately here at Imperva as WAAR. Each year we find new threats, continuing trends, and a deeper understanding... Continue reading
Posted Mar 25, 2016 at Imperva Cyber Security Blog
Comment
0
The Secret Behind CryptoWall’s Success: Key Findings from our Hacker Intelligence Initiative Report
CNET recently named ransomware the “hot hacking trend of 2016.” While we don’t particularly like making something so evil sound so glamorous, we have to agree: ransomware is a serious threat, and it’s here to... Continue reading
Posted Mar 24, 2016 at Imperva Cyber Security Blog
Comment
1
Combatting Insider Threats: 3 Ways to Protect Your Data from Internal Attacks
External cybersecurity threats get all the press, and they are certainly dangerous. Shadowy international gangsters, brilliant but evil hackers, mom-and-pop-shop criminals stealing from us one Target transaction at a time – as fictional as it... Continue reading
Posted Feb 26, 2016 at Imperva Cyber Security Blog
Comment
0
Learn how your defense posture stacks up: Attend this live webinar with CyberEdge Group
It’s no secret that cybercriminals are on the prowl 24/7. But did you know that the most dangerous threats actually come from inside your organization? Learn how to thwart insider threats, plus other key strategies... Continue reading
Posted Feb 16, 2016 at Imperva Cyber Security Blog
Comment
0
The Real Threats Around the Internet of Things
We think people are asking the wrong questions with respect to IoT and cyber security. One common question is “can someone hack my dish washer and what should I do to protect it”. The answers... Continue reading
Posted Feb 1, 2016 at Imperva Cyber Security Blog
Comment
0
Fact checking Mr. Robot: Reality vs. fiction on TV’s cyber security hit
[Warning: Spoilers!] Mr. Robot’s win at this week’s Golden Globes surprised many people, but we at Imperva weren’t among them. How could we not love a show about cyber security? It deserved the award for... Continue reading
Posted Jan 15, 2016 at Imperva Cyber Security Blog
Comment
1
The state of Website traffic revealed: Attend our webinar to learn more
In the past, good and bad bots were responsible for the majority of activity on the Web. However, our recent “Global Bot Traffic Report” finds a changing of the guard, as humans step to the... Continue reading
Posted Jan 7, 2016 at Imperva Cyber Security Blog
Comment
0
No Comment
We are often asked by the media to comment about the latest breach to some company X. Such was the case in the recently reported breach of the Hilton Hotels chain and the Vtech breach... Continue reading
Posted Dec 22, 2015 at Imperva Cyber Security Blog
Comment
0
Cyber Security Is the Board’s Business: The Top Five Questions Every Corporate Director Should Ask the CISO
As part of your fiduciary responsibility as a board member, you are expected to establish and govern business policies and practices that drive your company’s financial performance and growth. While the scope of your oversight... Continue reading
Posted Dec 7, 2015 at Imperva Cyber Security Blog
Comment
0
Imperva CTO Shares Top Cyber Security Trends for 2016
“In this world nothing can be said to be certain, except death and taxes.” And, now breaches? With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months,... Continue reading
Posted Dec 1, 2015 at Imperva Cyber Security Blog
Comment
0
Imperva named Deloitte Technology Fast 500 Company!
We are thrilled to share that Deloitte has named Imperva a Technology Fast 500 award winner! Fast 500 award winners are selected based on percentage fiscal year revenue growth over a three year period. Our... Continue reading
Posted Dec 1, 2015 at Imperva Cyber Security Blog
Comment
0
GRE Tunnel for Humans: Making Sense of Generic Routing Encapsulation
Generic routing encapsulation (GRE) is a communication protocol used to establish a direct, point-to-point connection between network nodes. Being a simple and effective method of transporting data over a public network, such as the Internet,... Continue reading
Posted Nov 18, 2015 at Imperva Cyber Security Blog
Comment
0
Why Directors Need To Be Concerned About Cyber Security
Imperva is honored once again to have Craig Shumard, recognized thought leader and spokesman in the area of information protection, guest blog for us. Craig has dedicated more than two decades to protecting private, sensitive... Continue reading
Posted Nov 17, 2015 at Imperva Cyber Security Blog
Comment
0
The Inside Scoop on Imperva CounterBreach Findings
Imperva is excited to announce the latest advancement in its cyber security technology: Imperva CounterBreach. This new security solution keeps enterprise data safe from compromised, malicious and careless internal users. CounterBreach combines machine learning with... Continue reading
Posted Nov 17, 2015 at Imperva Cyber Security Blog
Comment
0
More...
Subscribe to Veronica Robinson’s Recent Activity