Recent Articles
Visibility into Peacetime Traffic. Is it Too Much to Expect From Your DDoS Protection...
Today, everyone has at least one insurance policy. It could be a healthcare, automobile, or life insurance policy. We invest heavily in these policies and have high expectations for a return on our investment when the unforeseen happens and we need the protections they provide. But most of us...
How to Fight Bad Bots and Win: Radware’s New Crypto Mitigation Algorithms
Facing a daily barrage of attacks by bad bots, today’s web application defenses are starting to show their age. The challenge is huge. A user session could be a customer looking to buy a product, or a good bot such as a search engine or application monitoring tool. But...
The Four Pillars of a Cybersecurity Strategy That Works
Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization's defensive posture is another. Threat intelligence empowers organizations by providing them with the knowledge and visibility needed to make well-informed decisions about their security defenses and respond faster to current and evolving...
Why Automation is a Must Have for Disaster Recovery
We have seen a spate of cloud service provider outages with overly negative economic impact. The AWS outage in December 2021 disrupted Disney+, Ticketmaster, Slack and Netflix, among a host of others. The Facebook (now Meta) outage in October 2021 was particularly painful. It not only took down WhatsApp...
The Security Vulnerabilities of Third-Party Collaboration Tools
How many of you still participate in-person meetings on a daily basis?
If this question was asked before the beginning of 2020, it would have raised several eyebrows. Our working days prior to the pandemic were often filled with face-to-face meetings. In post-pandemic days, even with people going back into...
The Danger of API Security Overconfidence: Four Takeaways from Radware’s 2022 State of API...
A short list of the companies that have suffered recent API-related breaches are a who’s-who of the global technology brain trust: Microsoft, Venmo, Equifax, Instagram, Facebook, Amazon, PayPal, and many others.
If even these tech-savvy organizations are subject to cyberattack, the reality couldn’t...
Q1 2022 DDoS and Application Attack Activity: An Overview
The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors dominated the DDoS threat landscape while application security faced tried-and-true attack vectors.
These attacks were largely driven by a threat landscape turbocharged...
Securing applications in the multi-cloud: Where should organizations start?
The cloud represents a gamechanger in the way businesses access and use technology, but it’s also brought with it major implementation challenges. The most fundamental of these is simply that the cloud comprises multiple services and platforms, which has made integration a critical piece in the cloud...
Radware Mitigates 1.1Tbps DDoS Attack
As more businesses migrate critical resources and applications to the public cloud, attackers are adapting their tactics and techniques to match the scale of public cloud providers. Last week, this trend played out as reality for one of the world’s largest service providers when it was hit by a...