Meet Radware’s New Commercial-Grade Attack Mitigation Platform – Built to Defeat the Largest Cyberattacks

Modern cyberattacks are sophisticated and are often launched over long periods of time.  The complexity of these attack campaigns can result in attack detection and mitigation algorithms becoming less effective.  This in turn, can create an increased need for talent and staffing as well as drive large processing needs for service providers and large enterprises.

read more

Can a CDN Stop Cyber-Attacks?

In previous articles, we’ve reviewed content delivery networks (CDNs) from a variety of security perspectives – from how hackers have used them as weapons of DDoS to how bad actors can use free services to create astronomical billing issues.  CDNs are often used as a mask, to levy API abuse and web reflector attacks that plague the Internet via bots and scrapers.  Today, it is estimated that 65% of the traffic on the Internet is from such abuse.  If you were to reflect on that idea, would you think that a CDN can protect you?  That is the falsehood that is often believed.

read more

Stick or Carrot? Obama Calls for Public/Private Sector Cyber-Security Collaboration

Last Friday, President Obama continued his efforts of advancing cyber-security as a national priority. In a speech at Stanford University in the heart of Silicon Valley, the President emphasized the importance of collaboration between the public and private sectors to an audience of students, consumer-oriented companies, and representatives of the technology sector.

read more

How Mobile Operators Feel About Their Cyber Attack Risk

In the recent Light Reading webinar “Dealing with DDoS Application Threats in Mobile Networks,” Senior Heavy Reading Analyst Patrick Donegan and I discussed the increased frequency of application-based attacks in the mobile network. Leveraging Heavy Reading survey data and pointing to real examples, we sought to demonstrate just how vulnerable the network and mobile devices can become to DDoS attacks, especially as LTE scales.

read more

From Point Solutions to Application Centric Services: Cisco ACI and Radware

For decades IT managers have been deploying application delivery (Layers 4 – 7) and security services as point solutions.  The network provided the basic connectivity and each L4-7 had to be configured manually per each application.  Virtualizing the compute fabric enabled automation at the configuration stage; however, L4-7 and security were still deployed as point solutions.  Each application infrastructure change still required intervention in rewiring the physical network, reconfiguring network nodes and, of course, with testing application integrity end-to-end and performance.

read more