Imperva Blog|Login|中文Deutsch日本語

Webinars

Year: 2014 2013 2012 2011 2010 2009 2008 2007 2006 All Hide Descriptions
Selected Tag: Web Application Attacks | Show All
CUSRF | It's Pronounced "See You Surf" and It's Dangerous
March 26, 2014

CUSRF | It's Pronounced "See You Surf" and It's Dangerous


Cross USer Request Forgery (CUSRF: pronounced "See You Surf") is a new and emerging type of Cross-Site Request Forgery (CSRF) attack that affects users of collaboration platforms and applications, such as LinkedIn and Google Docs.

CUSRF exploits vulnerabilities in social networks to reveal a victim's true identity. Due to special technical characteristics of CUSRF attacks, most traditional counter-measures are irrelevant to the attack's mitigation. This webinar will:
  • Give a brief intro of CSRF
  • Examine the anatomy of a CUSRF attack, with examples
  • Discuss mitigation techniques for both consumers and platform providers
Presenters: Amichai Shulman, CTO, Imperva

Tags: Web Application Attacks, Web Application Security, CUSRF, Cross-Site Request Forgery

Play Webinar  
How to Stop Web Application Attacks
February 19, 2014

How to Stop Web Application Attacks


Like the doors and windows in a building, your Web applications are the most visible points of entry for cyber attackers to target.

Learn how to better understand how attackers find weaknesses in your Web applications, and how you can stop them. What methods do they use to crack those applications? How do they identify vulnerabilities, and what are the latest exploits they use to penetrate Web applications and steal the data behind them? This webinar will show you how to:
  • Identify potential attacks on your Web applications
  • Recognize vulnerabilities in your Web applications
  • Remediate websites and Web applications that have been compromised
Presenters: Tim Wilson, Editor, Dark Reading | Barry Shteiman, Director of Security Strategy, Imperva | Robert Hansen, Director of Product Management, WhiteHat Security

Tags: Web Application Attacks, Web Application Security, Data Security

Play Webinar  
Applications Under Siege - Defending Against Attack Outbreaks
August 15, 2012

Applications Under Siege - Defending Against Attack Outbreaks


"The typical Web application experiences attack incidents 274 times per year, with one target experiencing as many as 2,766 attack incidents. While under attack, the average Web application attack incident lasts 7 minutes and 42 seconds with the longest attack incident reaching one hour and 19 minutes," Imperva Web Application Attack Report, 2012. Planning protection based on the average Web application attack can leave your organization exposed to a crippling upper limit attack. Like a flood bursting through a levy, a large scale Web application attack will overwhelm and immobilize the unprepared organization. Based on the findings of our semi-annual Web Application Attack Report, this webinar will discuss:
  • Cumulative characteristics of Web application attack vectors, such as SQLi, XSS, RFI and LFI
  • Seasonal trends in Web application attacks
  • Intensity of attacks and how organizations can prepare for "battle days"
  • Proven defense solutions and procedures to combat attack bursts
Presenters: Amichai Shulman, CTO, Imperva

Tags: Web Security, Web Application Attacks, Data Security, Hackers

Play Webinar  
How to Prevent Remote & Local File Inclusion Attacks
April 18, 2012

How to Prevent Remote & Local File Inclusion Attacks


Did you know remote and local file inclusion (RFI/LFI) was among the four most prevalent Web application attacks in 2011? Why is RFI/LFI so attractive to hackers? Quite simply, with RFI/LFI a hacker can take over a Web server.

RFI and LFI attacks primarily affect Web applications written in the PHP programming language. PHP is the most popular server-side programming language. In fact, PHP is used by 77.2% of today's Web sites. Are you aware of the underlying technology that powers your website? For example, if you install WordPress, PHP code will end up on your server making it vulnerable to an RFI/LFI attack. This webinar will discuss:
  • How hackers use RFI/LFI, including how one vulnerability compromised 1.2M WordPress blogs
  • The anatomy of an RFI/LFI attack and how hackers avoid traditional detection techniques
  • How to successfully mitigate RFI/LFI attacks
Presenters: Tal Be'ery, Web Security Research Team Leader, Imperva

Tags: RFI, LFI, Web Application Attacks, Web Application Security, Hacking, Remote File Inclusion

Play Webinar  
Selected Tag: Web Application Attacks | Show All
Note: All webinars are approximately 60 minutes in length.