This is Rick Teplitz's Typepad Profile.
Join Typepad and start following Rick Teplitz's activity
Join Now!
Already a member? Sign In
Rick Teplitz
Tel Aviv
Recent Activity
Image
Starting September 21, renowned security blogger Brian Krebs came under what would turn out to be one of the largest DDoS attacks to date. With the attack reportedly reaching a peak 620 gigabits per second... Continue reading
Posted Sep 30, 2016 at Imperva Cyber Security Blog
Image
Unless you’ve been stranded on a desert island for the past two days, you’ve likely heard about the record breaking Yahoo! Breach involving the theft of a half a billion user credentials. A key fact... Continue reading
Posted Sep 23, 2016 at Imperva Cyber Security Blog
We believe that hackers are doing a good job at covering their tracks. Enabling them to remain unseen in enterprise networks and exfiltrate large amounts of data. Organization that don't have the right safeguards in place enable hackers to remain undetected for long periods of time. And slowly they put this stolen data up for sale on the dark web. Waiting months or years enables them to remain under the radar and active in the network, and to continue to enumerate and ultimately steal more and more data.
1 reply
Image
A concerning pattern has developed over the past few months involving a slow drip of large breaches, mostly involving stolen customer credentials. What makes these breaches concerning? The breaches didn’t happen last week, or last... Continue reading
Posted Sep 13, 2016 at Imperva Cyber Security Blog
Image
Matthew Rosenquist, Cybersecurity Strategist and Evangelist at Intel Corporation, shared a post on his LinkedIn feed discussing Intel’s approach to security with the Intel Management Engine (Intel ME). His comment accompanying the link touched upon... Continue reading
Posted Jul 7, 2016 at Imperva Cyber Security Blog
Image
Over the past few years, we’ve witnessed the advent of industrialized hacking. It’s long since moved past the stage of script kiddies and phone phreakers. It’s become a lucrative industry run by various mafia, international... Continue reading
Posted Jun 23, 2016 at Imperva Cyber Security Blog
Image
With all the discussions around the insider threat, where careless, compromised or malicious insiders (people working in your company) may represent risk to your organization’s data or operations, there’s an underlying threat that still passes... Continue reading
Posted Jun 15, 2016 at Imperva Cyber Security Blog
Image
For those of you who haven’t heard yet, none other than Facebook’s Mark Zuckerberg was hacked. Even though LinkedIn tried to play down a breach of their platform that resulted in 117 million of their... Continue reading
Posted Jun 6, 2016 at Imperva Cyber Security Blog
Image
The hack of the month for April 2016 could be given to the Bangladeshi breach where $81 million was mysteriously siphoned off from the bank and sent to the money-laundering underworld of the casino system... Continue reading
Posted May 8, 2016 at Imperva Cyber Security Blog
Image
According to the Verizon 2016 Data Breach Investigations Report (DBIR), “Web application attacks climbed to the #1 spot for data breaches.” This finding is worth repeating, Web applications are the #1 source for data breaches,... Continue reading
Posted Apr 27, 2016 at Imperva Cyber Security Blog
Image
Steve Durbin, Managing Director at the Information Security Forum (ISF) believes that defending against insiders is "always a matter of trust." He also reportedly said that negligent and accidental insiders pose a larger security risk... Continue reading
Posted Apr 23, 2016 at Imperva Cyber Security Blog
Image
Databases are the heart of every enterprise, and their secrets are the treasure of any hacker. Extracting data by bad actors is a risk that most enterprises face. With the evolution of databases and emergence... Continue reading
Posted Apr 8, 2016 at Imperva Cyber Security Blog
Image
A recent article on CNBC showed that 40% of corporate executives surveyed feel they’re not responsible for cybersecurity. It referred to a survey conducted by endpoint company Tanium that noted: “More than 90 percent of... Continue reading
Posted Apr 5, 2016 at Imperva Cyber Security Blog
Image
Passwords, they’re pretty much a headache for everyone involved. It’s a pain to come up with strong passwords and even harder to remember them, and it’s challenging for companies to enforce password rules for their... Continue reading
Posted Apr 1, 2016 at Imperva Cyber Security Blog
Image
A recent Facebook vulnerability involving an account takeover hack made headlines when Anand Prakash was probing Facebook to see if he could find vulnerabilities. He discovered that the password reset mechanism on Facebook could be... Continue reading
Posted Mar 22, 2016 at Imperva Cyber Security Blog
Image
Banking malware is a hot topic these days. With Account Takeover being of particular concern for major banking and retail institutions. In a recent post, Avivah Litan emphasized what she calls the “Invisibility of Banking... Continue reading
Posted Mar 15, 2016 at Imperva Cyber Security Blog
Image
In the previous posts of this series, we learned about the different types of insiders including careless, compromised and malicious insiders. This post explores the critical role Imperva CounterBreach plays in identifying insider threats before... Continue reading
Posted Mar 11, 2016 at Imperva Cyber Security Blog
Image
This is the third in a series of four posts on insider risk. Malicious insiders (which fall under the “insider misuse” category in the 2015 Verizon DBIR) are employees of your company that are out... Continue reading
Posted Mar 8, 2016 at Imperva Cyber Security Blog
Image
This is the second in a series of posts on insider risk. Compromised insiders are employees in your organization who have clicked on malicious links or opened malicious files and as a result have infected... Continue reading
Posted Mar 4, 2016 at Imperva Cyber Security Blog
Image
According to a summary by Gartner’s Anton Chuvakim of Verizon’s Data Breach Investigations Report for 2015, “Reported insider abuse features in 20.6% of all reported security incidents and 10.6% of confirmed data breach insiders.” Mr.... Continue reading
Posted Mar 2, 2016 at Imperva Cyber Security Blog
Image
Research by Carbon Black and published by Computerweekly recently discovered that 85% of CIOs in the UK are not proactively looking for threats, and that they only deal with breaches as they are discovered. The... Continue reading
Posted Feb 26, 2016 at Imperva Cyber Security Blog
Image
It was just published that a flaw in Cisco firewalls could allow remote attackers to execute code. As reported by Security Affairs: “The Cisco ASA Adaptive Security Appliance is an IP router that acts as... Continue reading
Posted Feb 24, 2016 at Imperva Cyber Security Blog
Rick Teplitz is now following The Typepad Team
Feb 22, 2016