Recent Articles

threat intelligence

Threat Intelligence Feeds for Better DDoS Protection

DDoS (distributed denial of service) attacks have become a major threat to a huge variety of businesses, from the smallest to the largest multi-national corporations. DDoS attacks can cause significant damage and disruption. They can adversely affect a targeted company’s reputation and result in lost revenue. It’s why many businesses now, as part of the investment to protect their network against DDoS attacks, are turning to threat intelligence feeds.
analytics

Using Radware ADC Analytics for Application Awareness and Simplified Troubleshooting

As a professional ADC administrator, you know how frustrating it can be to receive a call about application performance issues, especially on the weekend. Whether it's slow response times, connectivity failures, or other glitches, troubleshooting these problems can be a time-consuming and frustrating process.
DDoS protection

5 Things to Consider if You Need Ongoing DDoS Protection

Here are the first things that come to mind when many people think of a DDoS attack: Unsophisticated, the oldest trick in the book, not harmful, “I am not at risk”, and on and on. I am here to tell you it is all false. Our current DDoS threat landscape proves it. Although we see many attacks in the news that are related to political debates and extremists’ hacktivism, other targets, including high schools, e-commerce, and others, don’t necessarily make the news but are attacked as regularly.
application security

4 Reasons Why Application Security is a Dedicated Discipline Within Cybersecurity

As web applications become the core of business functions, application protection takes an ever more important role in protecting those applications, their availability and the customer data that is processed through them. However, as its importance grows, the domain of application security is also growing in depth and complexity, with a unique set of attacks, tools and mechanisms for mitigation attacks. As a consequence, it is becoming a dedicated discipline within cybersecurity, distinct from other domains or specializations.
DDoS Attack

The Power of 2: Why 2-Tier DDoS Protection is Critical for Your Business

A 2-tier DDoS solution combining on-premises and cloud-based protection is the best practice recommended by industry experts, such as Gartner. By utilizing both solutions, organizations can benefit from the strengths of each, including the ability to mitigate attacks closer to the source with on-premises protection and the scalability and flexibility of cloud-based protection.
DNS over HTTPS

Revolutionizing DNS Security: Cost-Effective Deployment of DoH for ISPs

DNS over HTTPS (DoH) is a protocol that allows for DNS resolution to occur through an encrypted HTTPS connection. Unlike traditional DNS resolution, which employs unencrypted UDP or TCP connections, DoH provides a heightened level of privacy and security and has been widely adopted by major web browsers and operating systems.
security operations center

Becoming a highly regarded and appreciated SOC operator — the tools you need in...

So, you've recently been hired to become a SOC (security operations center) manager for a major organization. You are obviously very excited. You're told that your role is to monitor — at all times — the organization to ensure it isn’t and won’t experience any cyber attacks.

Radware Customers Provide Insightful Tips for Women Interested in a Cybersecurity Career

Radware has the unique opportunity to work with many women in technology and cybersecurity. So, to celebrate International Women’s Day 2023, we turned to our customers — in this case, women — who continually provide us with interesting, insightful responses to questions we present to them. In this case, we asked them to provide advice and suggestions for women who are interested in working in technology and cybersecurity.
DDoS attacks

Terabit DDoS Attacks Need State-of-the-Art Terabit DDoS Mitigation — Are you ready?

The impact of these hyper volumetric DDoS attacks can be devastating — they cause extended downtime, financial losses and reputational damage. That’s why it’s critical that organizations are prepared to detect and mitigate these vicious attacks with a state-of-the-art mitigation on-prem platform.

Most Popular

What Drives DDoS Attacks and Why it Should be a Concern

ddos
DDoS stands for Distributed Denial of Service; the objective of a DoS attack is to disrupt or deny services from legitimate users.

4 Assumptions Preventing Effective API Protection

API Protection
API traffic has tripled in growth compared to the overall API traffic. Here are 4 common misconceptions companies have about API protection.

What it Means to Redefine Success in Cybersecurity

cybersecurity
Cyber threats are not going to decrease for the foreseeable future, and the challenges they pose to organizations are very real.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Recommended

2021 Cyberthreat Retrospective and Why It Was a Bumpy Ride

Threat landscape
2021 was the year where Ransom DoS confirmed its pervasive presence in the DDoS threat landscape.