It’s not everyday you can get 300 intelligent, motivated and successful IT executives all in one place. But this past week at the Radware Executive Exchange, we saw administrators from all over the globe travel to Tel Aviv, Israel to discuss the latest application delivery controllers, data center evolution and attack mitigation offerings from Radware.
In three days, there was a mixture of IT presentations, as well as a number of breakout sessions, where customers could see the latest technology and tools offered by Radware, first hand.read more
As you have likely have read in the news today, the hacktivist group Anonymous launched #OpIsrael – an online attack of Israeli websites in retaliation for recent missiles attacks from Gaza. Through efforts on social media outlets, IRCs and Pastebin, Anonymous called for its tens of thousands of supporters from around the world to join this attack.
This morning, Radware’s Emergency Response Team (ERT) released a new threat alert regarding an upcoming DDoS attack on Israeli websites including the IDF website, the Prime Minister Office website, Israeli banks, airlines and infrastructure sites. The attack started at 10AM Israel time on 11/15 and is expected to last for many hours.read more
At the Precipice of an IT Security Tipping Point: Radware & Ponemon Institute Unveil New Survey of Security Experts
At Radware, we feel strongly that 2012 has been the year of the DDoS attack – and it doesn’t look like it’s going to change any time soon. Over the past few months, we’ve seen strong evidence that cyber attacks, including DDoS and DoS attacks, will only continue to become more intense and more powerful. With little chance these attacks will slow down in the new year, it is essential for organizations to act now to protect themselves. That’s why we commissioned a new in-depth research report, “Cyber Security on the Offense: A study of IT Security Experts.” Co-authored with the Ponemon Institute, this survey of 705 senior IT security practitioners explores the current cyber threat landscape and how well prepared organizations are to deal with today’s large-scale DDoS and DoS attacks.
The results are telling.
While the majority of American’s will cast their vote for the next President of the United States by going to the polls this Tuesday, there are a growing number of Americans for whom the option of voting via email is now available. Currently, 32 States, and the District of Columbia, allow military personnel and registered voters living overseas to cast their ballots using email, fax or an Internet portal. However, in light of the recent damage wrought by Hurricane Sandy, New Jersey election officials are allowing voters displaced by the storm to cast their ballots via email as well.read more
About a month ago, I wrote a post on cloud load balancing versus application delivery controllers. In that post, I explored the core differences between cloud-managed load balancing and self-managed commercial load balancing, using an application delivery controller virtual appliance running over cloud infrastructure. In part two of this series, I take a closer look at some of the themes laid out in my earlier post with an emphasis on the role application delivery controllers play in addressing the challenges associated with migrating legacy applications to a general purpose cloud infrastructure.read more
From our personal to our professional lives, today most of us use social media in one form or another. Till now, the majority of organizations have focused primarily on the best ways to use social media to advance their business goals while guarding against employee misconduct. But with the substantial increase in the amount of sensitive data flowing across social media platforms, organizations should be asking whether or not social media makes their network environments more susceptible to both internal and external cyber threats. In this post I explore some of the key ways in which social media is changing the cyber security landscape and offer best practices for organizations looking to increase their “social security.”read more
In the same week that undercover FBI agents foiled a plot to attack the Federal Reserve Bank in New York City, a ninth bank was hit in what has been an ongoing cyber-assault on financial institutions in the United States. While these two different types of attacks, one physical and one electronic, share similar targets, both were met with two very distinct mitigation strategies.
In the case of the Federal Reserve, undercover federal agents took a proactive posture. The public was never in danger because agents led the attacker to believe he was given real bomb making materials. However, in the case of the bank cyber attacks, despite prior knowledge of being targeted for DDoS attacks, banks have been on the defensive, scrambling to stop the hemorrhage disrupting their operations. The lesson here is clear – a strong offense is the best defense against hackers.read more
In our world of “ones and zeroes” there has been an exponential increase in network and application attacks that can keep the most seasoned security teams on their toes. Even worse, effectively mitigating attacks means dedicating time and resources that may already be strained. But what if you had a “virtual” security team at your disposal that could be relied upon for their expert advice and assistance?
With this in mind, Radware has launched a new online resource where information security experts can learn about different types of attack vectors and trends that hackers are currently using and gain access to a plethora of resources in order to combat future attacks. Aptly named, “DDoSWarriors.com,” this easy to navigate site will help place security professionals on the offensive as opposed to being on the defensive.read more