President Obama’s mention of cyber-security in last night’s State of the Union Address came as no surprise. The Obama camp implemented a novel approach this year of “previewing” the President’s main agenda items through a series of speeches in the week preceding the SOTU. But even without the preview, the comments on cyber-security were rather predictable (and brief).read more
David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.
Let’s face it. DDoS are the big, fat, scary bully of the Internet. When organizations have sufficiently tight security or a would-be attacker doesn’t have the skills to overcome a target’s security, he or she can buy capacity on a bot-net or other delivery vehicle and slam packets from all over the world at the target’s site and application(s).read more
Want to Deliver the Best Possible User Experience in 2015? Consider These 8 Web Performance Resolutions.
In survey after survey, internet users say they want their online experience to be as safe, reliable, and fast as possible. That’s why security, availability, and performance are at the core of everything we do at Radware. And that’s why we’ve compiled this list of resolutions — from managing page bloat to regaining control of rogue third-party scripts — for site owners who want to deliver the fastest possible user experience to their audience.read more
With the information security industry suitably distracted by the attacks against Sony, there was a notable story that slipped quietly under the radar last week. On December 22, the New York Times reported that this summer’s breach at JP Morgan Chase was the result of a single server that got overlooked in a system-wide upgrade of security. Such an oversight is not entirely uncommon for vast enterprises managing tens-of-thousands of assets as part of their corporate network.read more
During the past 12 months, we’ve worked to provide more than application delivery and security solutions. Our goal was (and is) to share knowledge with the IT community so you can assess upcoming trends, implement best practices, and gain insights through our research. Thanks to our readers, partners, customers, and team members for another great year of sharing our thought leadership.
Here’s a look at what resonated the most with our readers this past year. Happy Holidays and we wish you a smart, successful, and secure 2015. Cheers!read more
Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.
In Part 1 of this blog, we looked at the growing adoption of cloud and Software-Defined Datacenter (SDDC), but also the fact that network virtualization choices are many and varied, creating some uncertainty regarding how to proceed. In part 2, we will look at network virtualization options and how to align for best success.read more
The frenetic pace of network security threats leads businesses of all size, and managers at all levels, struggling to understand risk.read more
With the allure of Black Friday weekend fading, online retailers are discovering that every day is Cyber Monday. Online shoppers expect deep discounts, free shipping, and a top-drawer user experience every day of the holiday shopping season. In this post, we’ll look at four strategies site owners are implementing to give shoppers a richer online experience, and the performance pitfalls (and solutions!) for each strategy.read more