Today’s File Security is So ’80s

The complexity of managing enterprise-level file permissions makes it increasingly difficult for security teams to keep track of who has access to what. In this report, Imperva...

Top 10 Indicators of Data Abuse

The threat from insiders is not a new phenomenon, but high-profile incidents have elevated enterprise focus on effective detection and mitigation of insider threats. Detecting...

Top 5 Database Security Threats

Data breaches are a threat to every organization. Breach damage goes beyond the loss or disclosure of sensitive or confidential data; companies incur significant financial...

2017 Cyberthreat Defense Report

CyberEdge Group’s fourth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against...
1 2 3 4