Online Credit Theft Happened to Me

Pling Pling!  You all know the tone when a new message arrives to your private mail inbox.

Recently, when this happened to me, I checked the message subject and was shocked right away. "Urgent: Please call me back!"  In our business world this kind of e-mail happens, but in this case the sender was my personal bank manager. In the last 10 years, I have never received a message like this from him.  I gave him a call and my manager told me that my wife’s credit card was compromised. An unknown person had used it for shopping at a sporting goods store in the US and to set up a VPN account to hide his criminal activities. 

read more

Best Practices for Hybrid Cloud/On-Premise Attack Mitigation

The cybersecurity industry keeps us all on our toes trying to follow up with solutions and breakthrough technologies – not only in advanced security capabilities, but also with state of the art methods of management and integration with other network security elements.

You want your security elements to play together in a well synchronized manner. You wouldn’t want to have to intervene to frequently make manual adjustments, would you?

read more

The Stadium of the Future Is Smart, But Is It Safe? How Hackers Could Target the Super Bowl – And How to Stop It

Levi’s Stadium is one of the most technologically advanced stadiums ever built.

It features 12,000 network ports, 1,200 access points, 1,700 beacons, and a DAS system, looking to accommodate an audience of 68,500 visitors. The stadium’s bandwidth capacity is 40Gbps (4x greater than the NFL stadium mandate put into place in 2015). Fans follow the game on 2,000 IPTVs.

read more

Is the Public Cloud the Ultimate Cyber-Attack Tool?

On January 2nd 2016, the BBC suffered from a cyber-attack that targeted all of its applications.  This attack resulted in unavailability for at least 3 hours.  It was also claimed that this DDoS Attack was over 600 Gbps – the largest DDoS attack ever recorded. The group claiming responsibility for the attack was New World Hackers and various articles have been published with one of the group members providing interviews about the incident. One of the main claims was that it was performed using Amazon by bypassing Amazon’s security measures and using administrative privileges.

read more

Is Your Organization Prepared for Cyber Attacks? The 2015-2016 Global Application & Network Security Report

Few organizations are well prepared when it comes to cyber-attacks.

Blending statistical research and front-line experience, and with more than 20 industries represented, Radware’s new 2015-2016 Global Application & Network Security Report reflects this.  The report outlines findings and analysis from our 2015 industry survey, reflects our Emergency Response Team’s (ERT) in-the-trenches experiences fighting cyber-attacks, and incorporates the perspectives of two 3rd party service providers. 

read more

Cyber Security Predictions for 2016

It’s fun to predict what may happen over a year in security.  The industry moves so fast and while some things do stay the course, it only takes one small catalyst to spark a new direction that nobody could have predicted.

There are many predictions already for 2016.  Radware has our own, which will be released soon as part of our annual Global Application & Network Security Report.  In the meantime, I wanted to share some other predictions made by other industry colleagues that piqued my personal interest.

read more