Recent Articles

Ransomware

Radware Threat Researchers Live: Ep.14

In this episode, our Threat Researchers share the latest update on the new ransom group REvil and the cyber threat landscape as it stands today.
Secure applications

How To Keep Apps and APIs Secure in an Interconnected World

APIs are the quintessential double-edged sword. They are the cement that interconnects systems and applications, but they add security vulnerabilities and complicate protection strategies
Data Breach

Why The Biggest Cyberattacks Happen Slowly

The most important thing to understand about data breaches and cyberattacks is that they are not a singular event.
Radware New Partnership

Outcomex and Radware Partner to Provide Application Security Solutions

Australian customers will have access to the complete Radware portfolio of application security services for hybrid environments.
security strategy

What Security Strategies Should Address Across Hybrid Environments

Organizations have to start thinking about security differently to ensure a coherent, comprehensive security strategy in a diverse environment.  
SSL Protection

Top 6 Questions to Ask When Selecting SSL Protection Solutions

There is no one-size-fits-all solution for SSL protection. Each organization has its own unique priorities, business needs, sensitivities, and privacy needs.
Frictionless Security

Frictionless Protection of Applications In A Cloud Motion World

Cloud migration and application deployment are dynamic processes spanning over years – hybrid environments are never really static.
Cloud Security

Why ‘Role’ Permissions Are So Dangerous To Your Cloud Environment

A key challenge facing organizations in the cloud is how to reign in excessive permissions. Benefits frequently come at a cost to security.
Extortion Ransomware

A Three-Episode DDoS Ransom Attack Prologue

DDoS attacks are becoming a part of ransom attacks. Instead of infiltrating secure organizational assets, attackers are launching devastating attacks

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.