Tag Archive for: Mousetrap

Benefits of Building a Multi-prong Mousetrap for WAF Policies with ML


The reason behind buying a market-leading Web Application Firewall (WAF) is to protect your website and web applications from malicious attacks, plus complying with industry or regional data and privacy standards. In addition to the typical OWASP Top 10 vulnerabilities, WAFs need to address a litany of cyber-threats from simple attacks like SQL injection to more sophisticated Advanced Bot Attacks. With the average cost of a data breach nearing 4 million dollars and the average time to identify and contain a breach nearing 280 days, enterprise security teams have an uphill battle to fight as the number and complexity of breaches grow. Fortunately, many security vendors are leveraging technologies – from automation and analytics to AI and crowdsourcing – in order to replace traditionally resource-intensive processes, for faster response times and for newer threat models. At Imperva, we recognized the growing threats of Bots from both the activity-level and threat complexity. To combat this, we’ve introduced Advanced Bot Protection (learn how Advanced Bot Protection is integrated into Imperva’s Cloud Application Security, here) that uses Machine Learning – this collects and analyzed data behavior for anomalies, and also incorporates advances in biometric data validation (e.g., mouse movements, mobile swipe, and accelerometer data, etc.) to catch malicious Botnets that attempt to hijack devices. We’re proud to say that we’ve become the industry leader in protecting and providing insights on advanced bots (download the 2021 Bad Bot Report).

Cybercriminals today are using AI, which typically runs on a supercomputer and is programmed to attack at any moment. Enterprise security professionals know the adage of ‘not bringing a knife to a gunfight’ and are continuing to seek out security solutions with advanced technologies to make their response a fair fight. Unfortunately, due to digital transformation initiatives or the post-covid era, the attack surface for enterprise continues to grow as threats continue to innovate, with the likes of botnet swarms and crypto-mining malware. Whether these threats are from individuals or nation-states, the intent to exploit has…

Source…