On June 13th, I’ll be back in the U.S. and will be going live on Facebook to talk about privacy, including some crucial questions to ask your healthcare providers, banks, and others to make sure your data is protected. Make sure to follow the Radware Facebook page for more updates. I look forward to answering your questions and chatting with you then.read more
In the “Silicon Hills” capital of the deep South, the world of technology movers and shakers descended upon Austin’s Convention Center for Light Reading’s Big Communication Event to discuss the latest disruptive technologies ripe to revolutionize the way we communicate.
Meanwhile, in the streets of Austin, a prickly regulation battle forced ultra-hip transportation companies Uber and Lyft to move their businesses out of the metro area. As a result, community engineers rallied around the clock to create a new app, called Ride-Austin, to fill the void – and reportedly in only 2 weeks’ time! This is only fitting in a startup town like Austin, as modern businesses everywhere are confronted with the reality of offering services to consumers in a nimble, automated, intelligent, dynamic, and virtual manner.read more
EgyptAir’s 20 Year Terror History:
Some quick thoughts on the most recent loss of EgyptAir’s flight 804 and how persistent terror has been one of the leading causes of accidents in this airlines history. The main questions to be asked as we move forward are as follows:
– If physical terror has played such a major role in aviation accidents, can cybersecurity sabotage be far behind?
– What controls / testing are done to ensure the ongoing operations of jets that rely increasingly on computers are safe and sound?read more
Airlines, retailers, travel service providers, banks, marketplaces, and social media – all rely on their web applications to generate revenues or facilitate productivity. They typically develop and maintain their own web applications which are tailored for their business needs. To support the growing needs of their online presence, they are adopting agile development practices also known as DevOps and Continuous Deployment.read more
On occasion, the topic of DDoS defense has come up and invariably goes to, “Why can’t organizations rely on ISP and cloud scrubbing services to protect themselves from DDoS attacks?” The conversation also rolls over to, “Why can’t organizations rely on on-premises solutions to protect themselves from DDoS attacks?” The latter is usually asked by someone who is a novice in the field, but both are valid questions. The true answer lies with a combination defense or, to coin a common security phrase, “defense-in-depth.”read more