Category: Blog

Enhancements to Akamai API Security, Q2 2025

Akamai API Security updates 3.48 and 3.49 include Compliance Dashboard enhancements, integration with Zuplo API gateway, and expanded sensor coverage. This article has been indexed from Blog Read the original article: Enhancements to Akamai API Security, Q2 2025

Introducing Akamai DNS Posture Management

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Introducing Akamai DNS Posture Management

Forget Perfect Prevention ? Build Cyber Resilience Instead

Discover why shifting from cyberattack prevention to cyber resilience is the key to survival in today?s relentless cyberthreat landscape. This article has been indexed from Blog Read the original article: Forget Perfect Prevention ? Build Cyber Resilience Instead

Redefining Application Security: Imperva’s Vision for the Future

It’s no secret that web applications have undergone a significant transformation over the past few years. The widespread adoption of containerization, serverless computing, low-code development, APIs, and microservices has redefined how applications are built, deployed, and scaled. According to Statista,…

A Sustainability Program with Regional Nuance

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: A Sustainability Program with Regional Nuance

Akamai API Security Enhancements

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai API Security Enhancements

What Is DNSSEC, and How Does It Work?

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: What Is DNSSEC, and How Does It Work?

Imperva Customers Are Protected Against CVE-2025-31161 in CrushFTP

Introduction A critical security vulnerability, identified as CVE-2025-31161 (previously tracked as CVE-2025-2825), has been discovered in CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0. This flaw allows unauthenticated remote attackers to access unpatched CrushFTP servers if they’re publicly exposed…

The Database Kill Chain

Modern attacks targeting sensitive data have become complex. An organization with many assets might be lost when trying to assess its overall risk, understand the pain points and prioritize the tasks required to secure its information systems. Cyber threat modeling…

The 2025 WAF Wave from the Other Side

Forrester just published its 2025 Web application Firewall Wave. As a former industry analyst, and as a contributor on the vendor side for Imperva (cough, a leader in the report, cough), let me share some reactions on the shape of…

Anatomy of a SYN-ACK Attack

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Anatomy of a SYN-ACK Attack

The 2025 WAF Wave from the Other Side

Forrester just published its 2025 Web application Firewall Wave. As a former industry analyst, and as a contributor on the vendor side for Imperva (cough, a leader in the report, cough), let me share some reactions on the shape of…