SBOMs, software, Lacework vulnerability management Cymulate decentralized supply

Lacework Employs Machine Learning to Consolidate Alerts

Lacework has added an ability to automatically correlate disparate alerts and severity events to enable cybersecurity teams to detect the patterns used to launch a cybersecurity attack. Kate MacLean, senior director of ...
Security Boulevard

At Kong Summit 2022, Imperva Will Demonstrate how to Use Terraform to Onboard Kong-managed Apps and Discover API Endpoints

Imperva and Kong are working together to simplify APIs Imperva is attending Kong’s 2022 Summit on September 28 and 29 in San Francisco. Imperva’s Summit booth will feature both a recorded and ...

Why the Search for Best-Of-Breed Tooling is Causing Issues for Security Teams

The growing need to consolidate vendor portfolios The adoption of best-of-breed security solutions has led to unforeseen problems for SOCs. Onboarding a new solution increases complexity; it requires configuration, integration with existing ...
Three Keys to Turning Data-centric Security Theory into Practice

Three Keys to Turning Data-centric Security Theory into Practice

Most cybersecurity professionals agree that as more organizations move data and applications to cloud-hosted environments, traditional measures focusing on protecting IT infrastructures are not up to the task. In fact, according to ...

The Three Key Competencies that Optimize Data Security Orchestration

One of the principal benefits of a modern data-centric security fabric is being able to automatically apply security controls to the data itself and drive policy-compliant data handling behavior by privileged users ...
How to do Feature Selection Using Feature Contribution Data

How to do Feature Selection Using Feature Contribution Data

Feature contribution is a method to give a weight to each feature that reflects its impact on the model’s prediction. Feature contribution can be calculated on an entire dataset or a single ...
Netskope cloud security Public Clouds Spread Malware

Cloud Security Tool Sprawl Draining IT Teams

Cloud security management issues are increasing the flood of false positive alerts and missed critical issues and contributing to higher burnout rates for IT teams. These were among the findings of an ...
Security Boulevard
FP Paradox image 1

The FP Paradox on the battlefield against COVID-19 and cyber threats

Let’s consider for a moment the “next” communicable virus. You show no symptoms but you try a home testing kit anyway, expecting the result to be negative. To your great surprise, the ...

Forrester report suggests Imperva Data Protection delivers high value and rapid ROI

In mid-2021, Imperva commissioned Forrester Research to interview five current Imperva enterprise customers – two in the financial services industry and three in the insurance industry. The goal of the exercise was ...

Top five insights from the 2021 CyberEdge Cyberthreat Defense Report

For the last eight years, the Cyberthreat Defense Report has been helping enterprise security professionals gauge their internal practices and security investments against their peers across multiple countries and industries. The report ...