The Security Concerns of SSL/TLS Encrypted Traffic

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) sites are used today to secure transactions on banking sites, health care portals, and enterprise network and application portals.  The use of these sites on the Internet has been increasing in past years and the volume of this type of traffic continues to grow, feeding speculation that perhaps one day these secure sites could replace clear-text HTTP. 

read more

New Findings: State of the Union for Ecommerce Page Speed and Web Performance [Spring 2015]

There are compelling arguments why companies – particularly online retailers – should care about serving faster pages to their users. Countless studies have found an irrefutable connection between load times and key performance indicators ranging from page views to revenue.

read more

NFV: What You Should Consider in Your ADCs

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.

Network functions virtualization (NFV) is one of the best-accepted and most-understood spinoffs of the SDN craze that has taken root over the past few years. The concept is straightforward: take features and capabilities that are typically implemented in the network and repackage them in forms that can be invoked automatically, without requiring the deployment of new hardware.

read more

3 Myths about Internet Connectivity – And How They Could Affect Your Business

Today’s Internet Service Providers (ISPs) invest money and effort in ensuring that the Internet links they provide to their customers work properly.  But is the investment delivering?  Let’s do a reality check and review some common myths related to Internet connectivity – and see if there is really any truth behind them.

read more

Meet Radware’s New Commercial-Grade Attack Mitigation Platform – Built to Defeat the Largest Cyberattacks

Modern cyberattacks are sophisticated and are often launched over long periods of time.  The complexity of these attack campaigns can result in attack detection and mitigation algorithms becoming less effective.  This in turn, can create an increased need for talent and staffing as well as drive large processing needs for service providers and large enterprises.

read more

Can a CDN Stop Cyber-Attacks?

In previous articles, we’ve reviewed content delivery networks (CDNs) from a variety of security perspectives – from how hackers have used them as weapons of DDoS to how bad actors can use free services to create astronomical billing issues.  CDNs are often used as a mask, to levy API abuse and web reflector attacks that plague the Internet via bots and scrapers.  Today, it is estimated that 65% of the traffic on the Internet is from such abuse.  If you were to reflect on that idea, would you think that a CDN can protect you?  That is the falsehood that is often believed.

read more

SDN Use Cases: Myths and Realities

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.

There were a lot of promises made when software-defined networking (SDN) first came onto the scene, and while some real benefits have been experienced, not all promises have been realized, or were even realistic. Such is commonly the case with new technologies: the initial hype exceeds the reality of the situation, but usually there are reasons to hold firm to the trend and take advantage of what the technology does deliver successfully.  

read more

Welcome To the Age of the Constant Attack

Time has a way of changing our perspective on things. New experiences and the evolution of everything around us can’t help but cause us to reconsider past ideas and outlooks. It is a truism of life that extends into many areas, including the way we look at IT.

read more