The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An attacker can just pick a set of automatic attack tools from the ones that are freely available online, install them, point them at lucrative targets, and reap the results.
In this video, Rob Rachwald, Director of Security Strategy at Imperva, talks about how attackers are using automation to carry out attacks on web applications. Rob talks about Imperva's research into the most frequently used automated tools and also discusses how you can identify automated hacking.
Posted on 19 November 2014. | Expectations for data security next year are surprisingly optimistic given the harsh reality of 2014. Enterprise security staffers are so confident that most respondents said they would "personally guarantee that their company's customer data will be safe in 2015."
Posted on 18 November 2014. | Ryan Ward, CISO at Avatier, talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, outlines the pre-requisites for becoming a risk assessment professional, and more.
Posted on 17 November 2014. | Mark Gazit, the CEO of ThetaRay, talks about leveraging Big Data to secure networks, the advantages of using math-based anomaly detection as well as the evolution of threat detection in the past decade.