Much has been written about Operation Blackout: the threat of Anonymous to take out the world’s thirteen root Internet servers. This operation has been launched in response to perceived attacks on free speech and thoughts.read more
Mobile World Congress 2012: When Intermingling Smartphones, IP phones, POTS lines and more, how do you maintain consistent quality of service?
It’s all in the delivery of the applications traversing the network. Visit Radware at the IMA partner booth (Hall 6 – C50)
Remember when you picked up the phone and could count on a dial tone and a clear connection? Voice communication was called a telephone; the service was POTS (plain old telephone service), and we dealt with only one provider — the telephone company that leased you the line and the equipment.read more
Visit Radware at booth #856.
If you’re headed to RSA 2012 in San Francisco, we hope you will stop by to meet the Radware team at booth #856 and learn about the latest leading attack mitigation techniques. Safeguarding businesses today against the constant barrage of hacktivism involves not only the right solutions, but also expert services and access to detailed, front-line research.
We encourage join us for a discussion of our “2011 Global Applications & Network Security” report prepared by Radware’s Emergency Response Team. This ground-breaking report provides an insightful, thought-read more
We’re beginning to hear more about content distribution network (CDN) providers burnishing their offerings with WAF-like capabilities. While it appears to address some of the concerns raised in Radware’s recent “2011 Global Application & Network Security Report,” there are some misconceptions of what CDN providers and other cloud security providers actually might be able to protect. Most cloud security providers and CDN providers miss a number of key issues.
Before I get into some of the more detailed and nefarious exploits Anonymous, AntiSec, LulzSec and the other hactivists have been using, I have a couple of simple questions:read more
Information Availability is needed before Integrity & Confidentiality!!!
Before I get into this heresy talk, let me start off by saying “I’m a security guy!”
I am a lifelong information security veteran who sees himself as a ‘practitioner’ – - that is I am an active participant in practicing the fine art of information security. I view my role in life metaphorically as I envision a Medical Doctor’s role – - trying to best deploy the highest efficacy of a ‘solution’ towards an ailment.read more