Recent Articles

Here’s How Healthcare Providers Can Stay Secure & Compliant

Patients and healthcare staff require access to data 24x7 via remote locations, without delays or impacts from usage spikes.

How to Secure a Changing Application Environment Across Platforms

There are many reasons why organizations leverage multiple platforms, but they all face the problem of securing a changing app environment.

Here’s How One Airline Upgraded Its Security in the Cloud

This is how one airline upgraded its security capabilities after experiencing a massive Brute Force attack.

Radware Threat Researchers Live: Episode 9

The latest episode of Radware Threat Researchers Live dives into booters and stressers, honeypots, ProxyLogon, the Tokyo Olympics and more.

Radware Powers New Cloud-Based Attack Mitigation Service Launched by Tech Mahindra

The new cloud security offering will enable Cloud DDoS Protection, Cloud WAF, Bot Management and Cloud Native Protector services.

Mitigating Low-and-Slow Attacks On Applications and APIs

Low-and-slow attacks, which used to be very effective against applications, are now taking advantage of overlooked APIs.

Addressing the Challenges of Least Privilege Access

In a cloud environment, adhering to the principle of least privilege reduces the risk of threat vectors accessing sensitive assets or data.

Security and DevOps: Keep it Tight

Here are some key characteristics to consider when evaluating WAAP that integrates well into your CI/CD pipeline.

IoT Botnets: Perspectives from a Residential Router

Residential routers face risks from the propagation of IoT botnets and the problem devices present once they are infected.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.