

2020 is a year unlike any other. Among the many effects of the global pandemic is the significant increase in online retail business. Throughout the year, Imperva Research Labs monitored traffic to e-commerce sites that exceeded the peaks typically seen in the holiday shopping season.
However, as the volume of online...
Published: Feb 08, 2021


Bad bots are on every website with a login page. Even yours. Hackers and fraudsters use bots to validate sets of login credentials, gain access to credit card data, and sell personally identifiable information on the dark web.
They also use stolen account data to transfer money, purchase goods, or spread a specific...
Published: Feb 08, 2021


The story of 2020 is of the devastating COVID-19 pandemic, and of how the world adapted. The story of malware in 2020 then, is a story of how the tools and tactics of cybercrime and cybersecurity changed against a backdrop of enormous changes to ordinary life.
As entire businesses switched to remote working, IT teams...
Published: Feb 24, 2021


Faced with shelter-in-place orders in their home counties and states, countless companies transitioned to entirely remote workforces.
Predictably, these near-immediate transitions carried with them some setbacks.
A remote workforce can become a workforce stretched thin: Communication must adapt to online models...
Published: Feb 04, 2021


Traditional approaches fall short when attempting to buy down risk in an ever-changing environment. Conflicting requirements of speed, convenience and security battle with one another as organizations seek to embrace digital transformation.
This whitepaper focuses on defense-in-depth, a framework that is at the heart...
Published: Feb 08, 2021


Web applications are the home of your business on the internet. The functionality within your website, the structure of your technology stack, and the code used to build it are under constant attack from bad actors attempting to compromise your business. Understanding these types of attacks will help you prevent fraud,...
Published: Feb 08, 2021


OpenText Secure Mail is a cloud-based secure messaging solution for encrypting, tracking, and preventing the leak and interception of confidential information.
Published: Oct 18, 2013


Whether we’ve realized it or not, everyone with an email account has received a transactional email, otherwise known as the alert that Bob accepted your friend request, the receipt for the days-of-the-week socks you just bought online, or even a welcome email for signing up for that new deal of the day website.
...
Published: Mar 27, 2014


Retail cybersecurity in the age of the omnichannel customer experience requires CIOs and vice presidents of IT to take a 30,000-foot view. Supporting multiple point-of-sale (POS) solutions, an assortment of cloud-based applications, distributed networking software, customer mobile devices, and other emerging technologies...
Published: Jan 19, 2021


Cybersecurity must be a top-level priority for any organization and for many it is. Security should be viewed holistically and include a range of elements, including layered, technology-based solutions on-premises and in the cloud, security awareness training to help employees become a more integral part of security defenses,...
Published: Jan 31, 2019


All the answers to your data science questions
Over half of all businesses are using data science to generate insights and value from big data. How are they doing it? Data Science Strategy For Dummies answers all your questions about how to build a data science capability from scratch, starting with the “what”...
Published: Sep 26, 2019


Brands have been the unwitting victims of scams since time immemorial. Now, in the age of phishing, it’s worse than ever. Sophisticated brand exploitation lures have been used to kick off some of the world’s most devastating cyberattacks.
Many organisations think they’re helpless to do anything...
Published: Oct 26, 2020


Investing in unified communications is certainly beneficial, but identifying the correct solution can be difficult. What factors determine the cloud's value? What can you do without? Most importantly—what does your business need?
Thankfully, we're taking the guesswork out of it. The Unified Communication...
Published: Nov 01, 2015


Each day, over 100 billion corporate email messages are exchanged. With email at the heart of businesses, security is a top priority. Email-based threats are more organized, targeted, and dangerous than ever before and the costs of security breaches nullify any short-term savings gained from settling for basic protection....
Published: Jun 16, 2014