DevOps Brings the Cloud to Application Development

Applications need to change quickly and easily in today’s fast-paced world of the internet. DevOps is bringing applications the ability to morph and evolve the same capabilities that the cloud has delivered to IT infrastructures. Applications require constant adjustments and fine tuning to meet consumer and market requirements. DevOps offers application development a flexible process model that delivers the agility and elasticity benefits found in cloud architectures.

read more

Newsrooms and Automation

Cyber-attacks and data breaches routinely make headlines in the largest publications and broadcasts in the world.  Millions have read and watched as news journalists explain exactly what had happened during the Proton Mail attack or the BBC hack. The access and manipulation that can happen when communication outlets are targeted is a very real and dangerous issue.

This issue, however, is complicated by the unique operating environments of these cyber-attack targets. Multiple locations, countless access points and very motivated attackers all contribute to the complex task of network protection.  As cyber-attacks become more automated and more sophisticated, the adaptability of security professionals is paramount.

read more

Securing Online Assets: Four Steps to Protect Your Online Business

Businesses of all sizes, across all verticals, generate significant sales online, increasing their risk and exposure from outages and breaches. Unfortunately, malicious actors understand this and target online businesses with this in mind. By and large, their efforts are successful. According to Radware’s 2016 Global Network and Application Security Report, 62% of those attacked suffered downtime or degradation. According to this same report, organizations now see more tangible financial impact from cyber-attacks. Over two-thirds (69%) of organizations say attacks cause revenue, customer, partner, and productivity loss (up from 45% last year).

Attacks aren’t just about outages or breaches, performance degradation caused by attacks are a growing problem as well. According to recent studies, 40% of customers will now wait 3 seconds or less before moving on to a competitor site, meaning the impact of performance loss is extremely tangible for online businesses.

read more

4 Reasons to Believe Future Cyber Attacks Will Terrorize

For years people have been talking about the threat of a Cyber Pearl Harbor or Digital September 11th event. There is a perception that this event would be an isolated incident that cripples society as we know it – heck, there is even a TV show about it. But what are the possibilities for such an occurrence in reality? Let’s take a look at three realistic categories where cyber terrorism is either already upon us or having its comeuppance.

Let’s look at four attack profiles which would reasonably either lead to loss of life or have the potential to leave the victim inevitably stricken with fear:

read more

Why Online Retailers Should Be On High Alert for Cyber-Attacks

The close of summer in the United States brings with it one of the most important online selling seasons for Internet retailers: Back-to-School (BTS) shopping. This critical shopping season trails Cyber Monday closely as the most important for online generated revenue for many retailers. According to a recent study by Field Agent, a research firm specializing in retail, nearly two-thirds of U.S. consumers plan to purchase at least some of their BTS goods online. So, naturally this is a time of year that the security teams for major online retailers need to be on high alert, keeping an eye out for any attacks that can disrupt operations or breach sensitive data. It’s also a time they need to worry about malicious actors targeting customers with phishing attacks, even if there’s little they can do directly to prevent them. With average consumers in U.S. planning to spend between $500-$1,000 on BTS shopping, any impediment to consumer sentiment and quality of experience can have dramatically bad effects.

Given the timeliness of the topic, let’s explore some of what we, at Radware, are seeing as significant trends both in the threat landscape targeting online retailers, but also changes they are making in their IT and business that play into the cyber threats.

read more

5 Reasons Why Kids Are Hacking Schools

Summertime is almost over, and back-to-school season is upon us. Beginning now, students all across the globe are beginning to register for their classes, purchase their school supplies, and start working on assignments for the upcoming year. But among these students, there are some who will get up to no good – hacking into the school systems to alter records, to disrupt the school’s normal operations, and to see just how much damage they can do. Let’s take a closer look at some of the reasons why kids are hacking their schools:

read more

DevOps is Changing IT Organizations

IT organizations need to adjust their structures and processes to adapt to DevOps. DevOps is making application development more streamlined and agile. The continuous development models that DevOps brings to IT requires significant changes to IT organizations and the way they interact with each other. The success of DevOps depends on its integration into evolving business models.

DevOps covers continuous development processes and agile models that allow businesses to modify, update, and deploy application changes quickly and easily. Where traditional development models have discrete handoffs between teams and cycles, DevOps introduces the ability for developers to make changes and push them through the development and production systems quickly and easily.

read more

The Rise of Booter and Stresser Services

Stressers

Denial of Service (DoS) attacks have come a long way since the days of LOIC and other GUI-based tools. Today, potential hackers do not have to know the first thing about conducting such an attack. They can simply purchase attack services to carry one out for them. Just a few years ago, attackers would have had to download simple GUI-based tool to launch a DoS attack. As time moved on, hackers started to combine their efforts and tools in distributed group attacks. Today, attackers are now abandoning GUI and script tools and opting to pay for attack services via stresser services.

read more