Figure 1

How to Predict Customer Churn Using SQL Pattern Detection

Introduction to SQL’s MATCH_RECOGNIZE Clause SQL is a great way to perform analysis on your data. It is very common and supported by many database engines including big data solutions. SQL is ...

Keeping Track Of URLs Shared On Bluesky

| | Javascript, Observable, SQL
While the future of Bluesky is nowhere near certain, it is most certainly growing. It’s also the largest community of users for the AT Protocol. Folks are using Bluesky much the same ...
Anomaly Detection at Scale Using SQL and Facebook’s Prophet Forecasting Algorithm

Anomaly Detection at Scale Using SQL and Facebook’s Prophet Forecasting Algorithm

Anomaly detection is a very important task. At Imperva we use it for threat hunting, risk analysis, risk mitigation, trends detection and more. In a previous post we showed how it can ...
many event types

Simple Trend and Anomaly Detection with SQL

Introduction Have you ever wondered if you can detect highlights based on your data using only your database engine? Well, the answer is yes. Simple trend detection and anomaly detection can be ...

Don’t Let Your Stored Procedures Lack Integrity

Unfamiliar territory As a security analyst, engineer, or CISO, there are so many aspects of the field that require immediate attention that one cannot possibly know everything.  Some of the common areas ...
SQL Injection loses #1 spot as most dangerous attack technique

SQL Injection loses #1 spot as most dangerous attack technique

The Common Weakness Enumeration (CWE), a community-developed compilation of the most critical errors leading to vulnerabilities in software, has lowered SQL Injection from its #1 spot as the most dangerous attack technique ...
What is Buffer Overflow? — Enterprise Knights of IBM Z

Six System and Software Vulnerabilities to Watch Out for in 2019

Wouldn’t it be an easier life if we didn’t have to worry about the exploitation of vulnerabilities in solutions and software on which we have spent good time and resources? A world ...
SQL Injection Attacks: So Old, but Still So Relevant. Here’s Why (Charts)

SQL Injection Attacks: So Old, but Still So Relevant. Here’s Why (Charts)

We’re living in the Golden Age of data. Some companies analyze it to better themselves, others trade it for profit, none give it up freely due to its value — for their ...
Fragmented SQL Injection Attacks – The Solution

Fragmented SQL Injection Attacks – The Solution

Ask someone how they'd detect whether a SQL Injection vulnerability exists in a web application and they're likely to suggest putting a single quote into a parameter in the application. Then, if ...
Microsoft and Imperva Collaboration Bolsters Data Compliance and Security Capabilities

Microsoft and Imperva Collaboration Bolsters Data Compliance and Security Capabilities

This article explains how Imperva SecureSphere V13.2 has leveraged the latest Microsoft EventHub enhancements to help customers maintain compliance and security controls as regulated or sensitive data is migrated to Azure SQL ...