Imperva Blog|Login|中文Deutsch日本語

Webinars

Year: 2014 2013 2012 2011 2010 2009 2008 2007 2006 All Hide Descriptions
Popular Tags: ADC, Compliance, Database Security, File, Hack, PCI, SharePoint, Trends, Web Application Security
The 6 Most Surprising SharePoint Security Risks
April 30, 2014
REGISTER NOW

Upcoming: The 6 Most Surprising SharePoint Security Risks


As SharePoint gains traction in your organization, users quickly create new sites and add data to help them share information and work more efficiently. Before you know it, sensitive files are spread throughout SharePoint and security becomes crucial. Are you aware of - and prepared to stop - all the SharePoint security risks that are out there?

SharePoint is a complex, far-reaching system that's exposed internally and externally. With increased reliance on SharePoint comes multiple security risks, some obvious and some you wouldn't have imagined.

Join us for a webinar to learn about some of the most surprising risks in SharePoint, uncovered by Imperva's security experts. This webinar will:
  • Discuss the six most surprising SharePoint threats including compromised insiders and search engine data leakage
  • Offer real-world examples of each threat
  • Provide practical methods for addressing these risks
Presenters: Carrie McDaniel, Product Marketing Manager, File Security, Imperva

Tags: SharePoint Security

Date: April 30, 2014
Time: 11:00 AM PDT | 2:00 PM EDT
 
CUSRF | It's Pronounced "See You Surf" and It's Dangerous
March 26, 2014

CUSRF | It's Pronounced "See You Surf" and It's Dangerous


Cross USer Request Forgery (CUSRF: pronounced "See You Surf") is a new and emerging type of Cross-Site Request Forgery (CSRF) attack that affects users of collaboration platforms and applications, such as LinkedIn and Google Docs.

CUSRF exploits vulnerabilities in social networks to reveal a victim's true identity. Due to special technical characteristics of CUSRF attacks, most traditional counter-measures are irrelevant to the attack's mitigation. This webinar will:
  • Give a brief intro of CSRF
  • Examine the anatomy of a CUSRF attack, with examples
  • Discuss mitigation techniques for both consumers and platform providers
Presenters: Amichai Shulman, CTO, Imperva

Tags: Web Application Attacks, Web Application Security, CUSRF, Cross-Site Request Forgery

Play Webinar  
How to Stop Web Application Attacks
February 19, 2014

How to Stop Web Application Attacks


Like the doors and windows in a building, your Web applications are the most visible points of entry for cyber attackers to target.

Learn how to better understand how attackers find weaknesses in your Web applications, and how you can stop them. What methods do they use to crack those applications? How do they identify vulnerabilities, and what are the latest exploits they use to penetrate Web applications and steal the data behind them? This webinar will show you how to:
  • Identify potential attacks on your Web applications
  • Recognize vulnerabilities in your Web applications
  • Remediate websites and Web applications that have been compromised
Presenters: Tim Wilson, Editor, Dark Reading | Barry Shteiman, Director of Security Strategy, Imperva | Robert Hansen, Director of Product Management, WhiteHat Security

Tags: Web Application Attacks, Web Application Security, Data Security

Play Webinar  
Cyber Side-Effects - Cloud Databases and Modern Malware
January 29, 2014

Cyber Side-Effects - Cloud Databases and Modern Malware


Database as a Service (DBaaS) offers a self-service model for provisioning databases, without the cost of setting up servers and burdening IT teams. However, DBaaS also offers cyber criminals easier access to your data, from both inside and outside the service.

Apart from offering criminals a cheap and safe playground, DBaaS itself introduces new security issues. When an organization's internal data is stored in the cloud, an attacker no longer needs to gain access to the organization's network before compromising high-value data. This webinar will:
  • Show how attackers are exploiting cloud database services in their operations
  • Discuss key implications to internal databases
  • Identify the hidden risks of DBaaS
  • Re-asses the severity of database vulnerabilities in a hosted environment
Presenters: Amichai Shulman, CTO, Imperva

Tags: Database Security, DBaaS, Vulnerabilities, Cybercriminals

Play Webinar  

Top Security Trends for 2014
December 17, 2013

Top Security Trends for 2014


Imperva's dedicated research organization, the Application Defense Center (ADC), constantly monitors attackers - and their attack methods - to isolate the most relevant attack campaigns. Based on this research data, the ADC has identified the top trends poised to have the most significant impact on the security landscape in 2014.

Join Imperva CTO and head of the ADC, Amichai Shulman as he presents the security trends that will resonate across the globe in the upcoming year. Below is a sneak peak of top security trends:
  • Return of Compromised Web Servers: attackers are now infiltrating networks via external facing servers
  • Rise of Cloud Platform Breaches: long a concern, large-scale attacks in the Cloud are fast becoming a real problem
  • Spread of 3rd Party Application Vulnerabilities: these application attacks are growing in size, scope, and volume
Presenters: Amichai Shulman, CTO, Imperva

Tags: Trends, Web Application Security, Database Security, Vulnerabilities

Play Webinar  
Hiding in Plain Sight: The Danger of Known Vulnerabilities
November 13, 2013

Hiding in Plain Sight: The Danger of Known Vulnerabilities


While a lot of attention is devoted to the mitigation of previously unknown attack methods ("0 days"), many of today's high-profile breaches are caused by "Known Vulnerabilities" in the application's components, also referred to as "vulnerabilities in third-party components." Attackers are quickly moving to exploit applications built with vulnerable components and are inflicting serious data loss and/or hijacking entire servers in the process.

The rising popularity of third-party components in application development enables attackers to quickly and repeatedly locate and exploit vulnerabilities in application components - making these attacks widespread and extremely hazardous. This webinar will:
  • Explore the recent growth of "Known Vulnerabilities" and examine the scope of the problem
  • Examine how attackers are able to quickly "weaponize" these vulnerabilities for immediate profit
  • Reveal techniques for limiting the damage resulting from "Known Vulnerabilities" exploitation
Presenters: Tal Be'ery, Web Security Team Leader, Imperva

Tags: Vulnerabilities, Web Security, Web Application Security, Zero Day, Data Theft

Play Webinar  
PCI 3.0 Revealed - What You Need to Know Today
November 7, 2013

PCI 3.0 Revealed - What You Need to Know Today


On November 7th, the PCI Security Standards Council will unveil v3.0 of the Payment Card Industry Data Security Standard (PCI DSS). On the same day the new version is released, Imperva's Director of Security Strategy, Barry Shteiman, will deliver a free webinar focusing on the most significant changes to the standard.

Imperva is a participating organization in the PCI Council and has helped hundreds of organizations improve data security and demonstrate compliance with PCI DSS. Please join Barry in this informative webinar as he discusses:
  • The historic development of the PCI DSS standard
  • Key changes introduced in PCI DSS 3.0
  • Lessons learned - compliance as risk mitigation
Presenters: Barry Shteiman, Director of Security Strategy, Imperva

Tags: PCI, PCI DSS, Data Security, Compliance

Play Webinar  
Detect and Remediate Advanced Targeted Attacks
October 30, 2013

Detect and Remediate Advanced Targeted Attacks


Despite huge investments in anti-virus software, next-gen firewalls, and IPS platforms, companies are still getting hacked. The new generation of advanced targeted attacks bypasses traditional defenses and put sensitive data at risk. It takes just minutes from the time an organization is compromised to the exfiltration of sensitive data.

What's needed is a security solution that can detect and block data center threats while allowing easy, appropriate access to the assets essential to running your business. Join Imperva and FireEye for a webinar addressing data center security requirements and solutions. We'll discuss how to:
  • Protect data and applications from modern, advanced attacks
  • Enable business to continue while remediation takes place
  • Provide Incident Response teams with actionable forensic information
  • Support a risk-based approach to malware remediation
Presenters: Ruby Sharma, Technical Alliance Manager, FireEye & Raphael Reich, Sr. Director Product Marketing, Imperva

Tags: Anti-Virus, Malware, IPS, Web Application Security, Next-Gen Firewalls, Targeted Attacks, Data Security, Insider Threat

Play Webinar  
Protecting Against Vulnerabilities in SharePoint Add-ons
October 16, 2013

Protecting Against Vulnerabilities in SharePoint Add-ons


As the pace of Microsoft SharePoint adoption continues, most organizations are turning to third party add-ons to support demands for functionality. It's for these reasons that experts compare SharePoint without add-ons to an iPhone without apps. Third party add-ons, however, arrive pre-packaged with unique security risks -- vulnerabilities that IT cannot directly fix.

Join Imperva's Carrie McDaniel to learn how organizations can offset vulnerabilities found in SharePoint add-ons by applying a multi-layered defense strategy. This webinar will:
  • Identify risks associated with using SharePoint plug-ins and web parts developed by third parties
  • Describe how hackers target and exploit third-party code using attacks such as SQL injection
  • Introduce a three-layered approach to securing SharePoint
Presenters: Carrie McDaniel, SharePoint Security, Imperva

Tags: Web Security, Web Application Security, SharePoint, Vulnerabilities

Play Webinar  
A Blueprint for Web Attack Survival
September 24, 2013

A Blueprint for Web Attack Survival


Is your organization prepared to face a large-scale attack from hacktivists or cybercriminals? This webinar provides a step-by-step plan to protect web applications using proven strategies from application security consultants that have been on the front lines of attack.

Join security experts from Imperva and WhiteHat Security to see what steps your organization can take to implement a comprehensive strategy for repelling web attacks. This webinar will:
  • Describe the modern attack methods and tools used by hacktivists and cybercriminals
  • Explain the processes and technologies you can use to safeguard your website
  • Help you prioritize security efforts and identify security tips and tricks you might have overlooked
Presenters: Kasey Cross, Imperva, & Nick Silver, WhiteHat Security

Tags: Web Security, Web Application Security, Hackers, Cybercriminals, Hacktivists

Play Webinar  
PHP SuperGlobals - Supersized Trouble
September 11, 2013

PHP SuperGlobals - Supersized Trouble


Used in over 80% of all websites, PHP is the most popular Web application development platform in the world. The widespread use of PHP, however, makes it an attractive target for malicious hackers. By focusing attacks on vulnerabilities found in popular third party components, such as PHP, hackers are able to expand their reach to countless unsuspecting websites.
Presenters: Tal Be'ery, Web Security Team Leader, Imperva

Tags: Web Security, Web Application Security, PHP, Hackers

Play Webinar  
Targeted Attacks - 8 Step Plan to Safeguard Your Organization
July 17, 2013

Targeted Attacks - 8 Step Plan to Safeguard Your Organization


Is your business safe from malware and targeted attacks? Cyber security experts suggest that it's likely your organization's data has already been breached. So rather than asking "what if?", it's time to ask "now what?".

Sophisticated attacks leverage social engineering techniques and malware to compromise those individuals already on the inside of your enterprise, and then steal your data. By targeting your trusted employees, attackers can circumvent conventional defenses like firewalls and IPS solutions to penetrate your network and compromise your data center. This webinar will:
  • Examine why attackers looking to steal sensitive data targeted your data center
  • Explain how targeted attacks, often using spear phishing and malware, consistently defy perimeter and endpoint defenses
  • Present an eight step incident response model to help prevent, detect, and respond to targeted attacks
Presenters: Barry Shteiman, Director of Security Strategy, Imperva

Tags: Data Theft, DataSecurity, Social Engineering, IPS, Firewalls, Malware, Targeted Attacks, Phishing

Play Webinar  

CMS Hacking 101
June 26, 2013

CMS Hacking 101


With the rise of blogs, forums, online magazines, e-commerce, and corporate websites, many organizations are turning to Content Management Systems (CMS), such as Joomla or SharePoint, to create rich websites. CMSs simplify website delivery - but they also expose your organization to a new set of vulnerabilities.

Join Barry Shteiman, Imperva Sr. Security Strategist, to see how malicious hackers exploit vulnerabilities found in popular Content Management Systems to systematically identify and attack unsuspecting organizations. This webinar explores:
  • What a CMS based site is and examples of recent CMS originated hacks
  • Trends in automated CMS hacking
  • How to secure your website against vulnerabilities found in CMS systems
Presenters: Barry Shteiman, Sr. Security Strategist, Imperva

Tags: Content Management Systems, CMS, Joomla, SharePoint, Hackers, CMS Hacking, Web Attacks, Data Security

Play Webinar  
4 Security Guidelines for SharePoint Governance
May 22, 2013

4 Security Guidelines for SharePoint Governance


82% percent of organizations use SharePoint to store secure content. Over half worry that their deployments do not meet security or compliance requirements. This sentiment is indicative of the growing concern among organizations that their SharePoint deployments are a security disaster waiting to happen.

SharePoint governance can seem like a daunting task and leave many organizations wondering where to start. This webinar provides a four step program for establishing SharePoint governance and security.This webinar will:
  • Identify drivers for governance, including regulatory compliance, Web attack protection, and data security
  • Provide four steps for securing SharePoint through governance efforts
  • Outline a risk-based approach for aligning priorities and investments
Presenters: Carrie MacDaniel, File Security Team, Imperva

Tags: SharePoint, SharePoint Governance, SharePoint Security, Compliance, Web Attacks, Data Security

Play Webinar  
The Value of Crowd-Sourced Threat Intelligence
May 1, 2013

The Value of Crowd-Sourced Threat Intelligence


On April 3, CNBC reported the details of a large-scale attack campaign targeting the banking industry. As a result of this campaign, multiple U.S. banks experienced website outages totaling 249 hours over a six week period. Would the damage from the attack campaign have been reduced if the banks had the ability to share crowd-sourced threat intelligence?

Imperva's Application Defense Center (ADC) recently analyzed real-world traffic from sixty Web applications to identify attack patterns. The results of the study demonstrate how sharing attack patterns across a community of Web applications can significantly mitigate the risk of large-scale attack campaigns. This webinar will:
  • Identify how cross-site information sharing (crowd-sourcing) creates security intelligence
  • Demonstrate the value of adding crowd-sourced intelligence to Web application security
  • Provide real-world examples of attack patterns that can be shared for community defense
Presenters: Amichai Shulman, CTO, Imperva

Tags: Data Security, Database Security, Data Theft, Database Threats, Hackers

Play Webinar  

Top 10 Database Threats
March 27, 2013

Top 10 Database Threats


96% of all records breached are stolen from databases, according to a 2012 Verizon Data Breach Report. Why do databases have the highest rate of breaches among all business assets? The answer is simple: they house the sensitive business data that malicious insiders and hackers want most.

The risk of a database breach can be mitigated by implementing internal controls and following industry best practices - but you must first understand the shifting threat landscape. This webinar will:
  • Present the top 10 threats to your database in 2013
  • Define a layered defense strategy for preventing database breaches using industry best practices
  • Demonstrate a successful defense against data theft with a customer case study
Presenters: Raphael Reich, Director Data Security Solutions, Imperva

Tags: Data Security, Database Security, Data Theft, Database Threats, Hackers

Play Webinar  
Lessons Learned From the Yahoo! Hack
February 20, 2013

Lessons Learned From the Yahoo! Hack


In December 2012, Yahoo! Inc. suffered a high profile data breach at the hands of a lone hacker. Using SQL injection attacks, the hacker gained full access for the server of the affected domain. Alarmingly, the exploited vulnerability likely belonged to a third party application that was neither coded nor hosted by Yahoo!.

Yahoo! was responsible for the third party application's security, yet it only had limited control of the code. Join Imperva's Amichai Shulman as he discusses the key lessons learned from the Yahoo! breach. This webinar will:
  • Analyze the tools and methodology employed by the attacker to bypass security
  • Explore the dangers of hosting third party code inherited from partners, vendors, or via acquisitions
  • Provide procedural and technical steps for securing third party code
Presenters: Amichai Shulman, CTO, Imperva

Tags: Data Security, Database Security, Web Security, Web Application Security, Hackers

Play Webinar  
Assessing the Effectiveness of Anti-virus Solutions
January 23, 2013

Assessing the Effectiveness of Anti-virus Solutions


According to a recent study conducted by Imperva's research arm and students from The Technion – Israeli Institute of Technology, as little as 5% of newly created viruses are detected by anti-virus solutions. Moreover, it can take as long as four weeks after the introduction of a virus before it is detected by anti-virus solutions.

How well do anti-virus solutions defend against newly created viruses? The answer may surprise you. Join us in a live webinar as we examine the effectiveness of anti-virus solutions. This webinar will:
  • Evaluate the ability of anti-virus solutions to react to newly created viruses
  • Explore the window of opportunity created before anti-virus solutions begin to detect new viruses
  • Illustrate how targeted malware of limited distribution can elude detection for months or years
  • Explain how misguided compliance mandates create over-investment in anti-virus solutions within security budgets
Presenters: Amichai Shulman, CTO, Imperva

Tags: Anti-Virus, Data Security, Malware, Hackers

Play Webinar  

Top Security Trends for 2013
December 19, 2012

Top Security Trends for 2013


Looking at the security landscape for 2013, we predict that previous security investments made by larger, well-funded organizations will serve as a partial deterrent to hackers. However, those same hackers, armed with sophisticated malware and cloaked in a dangerous anonymity provided by the Cloud, will turn their collective eyes to a new, more vulnerable target: small companies.

Join Imperva Senior Vice President Mark Kraynak as he reveals the four super-sized security trends that will impact business security practices across the globe in 2013. Below is a sneak peak at each trend:
  • Government Malware Goes Commercial: tactics historically tied to "state sponsored" attacks move to the mainstream
  • Black Clouds on the Horizon: profit-driven hackers leverage the Cloud to unleash fraud and business logic attacks
  • Security Strength in Numbers: business and government will combine individual protection data to create collaborative defenses
  • APT Targets the Little Guy: cyber criminals employ traditional, enterprise-size APT methods to pillage smaller businesses
Presenters: Mark Kraynak, SVP WW Marketing, Imperva

Tags: Trends, Data Security, Malware, APT, DDoS, Web Security, Web Application Security, Hackers

Play Webinar  
How Targeted Attacks Evade Anti-Virus Software
November 14, 2012

How Targeted Attacks Evade Anti-Virus Software


Are your employees unknowing victims of targeted attacks? Sophisticated attacks now leverage social engineering techniques and malware to compromise those individuals already on the inside of your enterprise. The objective of these attacks is clear: target and compromise specific individuals within an institution to obtain high-value data. Even though these threats are not mass automated attacks, the effects on a compromised organization can be long-lasting. This webinar will:
  • Discuss the rise in malware and targeted attacks
  • Highlight why anti-virus software is powerless against sophisticated attacks
  • Provide mitigation strategies for the compromised organization
Presenters: Rob Rachwald, Director of Security Strategy, Imperva

Tags: Social Engineering, Anti-Virus, Malware, Insider Threat, Data Security

Play Webinar  
Deconstructing Application DoS Attacks
October 17, 2012

Deconstructing Application DoS Attacks


As one of the most discussed topics on hacker forums, denial of service (DoS) attacks continue to move up the stack from the network to the application level. Since many anti-DoS solutions focus on the lower layers, hackers are targeting specific Web servers, such as IIS or Apache, or applications, such as SharePoint, in order to reduce the likelihood of attack detection. Join Imperva's Tal Be'ery as he discusses the latest trends, techniques, and technologies deployed by hackers and provides security professionals with specific steps to mitigate this threat. This webinar will:
  • Summarize the general characteristics of application DoS attacks
  • Discuss how and why hacktivists utilize distributed denial of service (DDoS)
  • Highlight real-world incidents from OpColumbia, OpBahrain, and OpRussin
  • Examine how black-hat hackers conduct attacks with white-hat testing tools
Presenters: Tal Be'ery, Web Security Team Leader, Imperva

Tags: DDoS, Web Security, Web Application Security, Hackers, Denial of Service, DoS

Play Webinar  

A CAPTCHA in the Rye
September 19, 2012

A CAPTCHA in the Rye


In J.D. Salinger's The Catcher in the Rye, main character Holden Caulfield is a confused teenager who views anyone he meets, or knows, as a "phony." This attitude, among other factors, contributes to Holden's dysfunctional nature. How are today's hackers blurring the line between real and "phony" and compromising CAPTCHA security in the process?

A CAPTCHA, or Completely Automated Public Turing test to tell Computers and Humans Apart, is a common security measure used to distinguish between humans and a "phony." However, with hackers now deploying numerous methods to bypass CAPTCHAs, the line between real and phony isn't clear and security professionals are forced to present CAPTCHAs sub optimally. This webinar will:
  • Review the use of CAPTCHAs as a security mechanism against malicious automation
  • Examine the threat human-based CAPTCHA solving services pose to Web security
  • Analyze four case studies of CAPTCHA bypassing in the wild
  • Provide recommendations to improve the efficiency of existing CAPTCHA mechanisms by integrating with other automation detection measures
Presenters: Tal Be'ery, Web Security Team Leader, Imperva

Tags: CAPTCHA, Web Security, Web Application Security, Hackers

Play Webinar  
Applications Under Siege - Defending Against Attack Outbreaks
August 15, 2012

Applications Under Siege - Defending Against Attack Outbreaks


"The typical Web application experiences attack incidents 274 times per year, with one target experiencing as many as 2,766 attack incidents. While under attack, the average Web application attack incident lasts 7 minutes and 42 seconds with the longest attack incident reaching one hour and 19 minutes," Imperva Web Application Attack Report, 2012. Planning protection based on the average Web application attack can leave your organization exposed to a crippling upper limit attack. Like a flood bursting through a levy, a large scale Web application attack will overwhelm and immobilize the unprepared organization. Based on the findings of our semi-annual Web Application Attack Report, this webinar will discuss:
  • Cumulative characteristics of Web application attack vectors, such as SQLi, XSS, RFI and LFI
  • Seasonal trends in Web application attacks
  • Intensity of attacks and how organizations can prepare for "battle days"
  • Proven defense solutions and procedures to combat attack bursts
Presenters: Amichai Shulman, CTO, Imperva

Tags: Web Security, Web Application Attacks, Data Security, Hackers

Play Webinar  
Shaping-Up SharePoint Security in Five Steps
July 25, 2012

Shaping-Up SharePoint Security in Five Steps


The use of Microsoft SharePoint is growing rapidly inside most enterprises; however, native functionality fails to address critical security risks. For organizations, this shortcoming poses a tremendous challenge: How do you balance the need for collaboration with the need for security? Join Imperva CTO, Amichai Shulman, as he addresses the key technical aspects of SharePoint security. In particular, this webinar will identify the most important steps to securing SharePoint, including:
  • How SharePoint is architected and the inherent security gaps
  • How to protect SharePoint from insider threats
  • How to stop hackers from breaking externally facing SharePoint deployments
Presenters: Amichai Shulman, CTO, Imperva

Tags: SharePoint Security, Insider Threats, Data Security, Hackers

Play Webinar  
Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
June 20, 2012

Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground


Research attributes nearly half of a typical website's traffic to automated bots. This puts the odds of falling victim to a cyber attack at 100%. With the press of one key, an unskilled, inexperienced hacker can attack hundreds of applications within minutes. Automation tools, such as SQLMap and Havij, open new avenues for amateur and professional hackers to evade security defenses. How will your team prepare for, and stop, malicious, automated site traffic and defend against zero-day attacks? This webinar will:
  • Highlight observed trends in the automation of SQLi and RFI attacks
  • Reveal the warning signs of an automated attack
  • Suggest identification methods and proven countermeasures to stop attacks
Presenters: Amichai Shulman, CTO, Imperva

Tags: Hacking, Web Application Security, Database Security, SQLMap, Havij, SQLi, RFI

Play Webinar  
The Insider's Guide to Insider Threats
May 23, 2012

The Insider's Guide to Insider Threats


Did you know 70% of employees plan to take sensitive business data with them when they leave their job? Further, did you know over 50% feel they have rights to this data? If you think your organization has avoided the insider threat, you may need to look deeper.

Pinpointing the source and scope of data theft is often hard to quantify, especially since your largest internal threat may actually be one of your most loyal employees. This webinar presents the findings of the first-ever global insider threat study that catalogs common practices used by leading organizations across numerous verticals. This presentation will:
  • Define the insider threat
  • Quantify the prevalence of the problem
  • Uncover controls that have proven most effective at minimizing the risk of insider threats
Presenters: Rob Rachwald, Director of Security Strategy, Imperva

Tags: Insider Threat, Data Security, Data Theft, Database Security, File Security

Play Webinar  
How to Prevent Remote & Local File Inclusion Attacks
April 18, 2012

How to Prevent Remote & Local File Inclusion Attacks


Did you know remote and local file inclusion (RFI/LFI) was among the four most prevalent Web application attacks in 2011? Why is RFI/LFI so attractive to hackers? Quite simply, with RFI/LFI a hacker can take over a Web server.

RFI and LFI attacks primarily affect Web applications written in the PHP programming language. PHP is the most popular server-side programming language. In fact, PHP is used by 77.2% of today's Web sites. Are you aware of the underlying technology that powers your website? For example, if you install WordPress, PHP code will end up on your server making it vulnerable to an RFI/LFI attack. This webinar will discuss:
  • How hackers use RFI/LFI, including how one vulnerability compromised 1.2M WordPress blogs
  • The anatomy of an RFI/LFI attack and how hackers avoid traditional detection techniques
  • How to successfully mitigate RFI/LFI attacks
Presenters: Tal Be'ery, Web Security Research Team Leader, Imperva

Tags: RFI, LFI, Web Application Attacks, Web Application Security, Hacking, Remote File Inclusion

Play Webinar  
Note: All webinars are approximately 60 minutes in length.