Recent Articles

How COVID-19 is Forcing Increased Digital Outreach

Radware CEO Roy Zisapel addresses how COVID-19 is rapidly accelerating digital transformation & how the threat landscape is likewise evolving.

Protecting Remote Connectivity in Today’s ‘New Normal’

Any negative impacts to the availability of remote access technologies have moved from the realm of “inconvenience” to “business/service-impacting outage.”

COVID-19 Best Practices for Public Clouds

This report combines 56 misconfiguration rules for AWS/Azure and focuses on public exposures, excessive permissions, authentication and visibility.

How to Protect Applications from Cloud-Based Attacks

Radware & Microsoft discuss the primary security threats to public cloud infrastructure and applications during the COVID-19 pandemic.

Who’s Viktor? Tracking down the XTC/Polaris Botnets.

Even though Hoaxcalls reuses code from botnets such as Tsunami, Gafgyt and Mirai, the tactics and methods leveraged by the operators warrants a review.

Cyber Security Trends in Times of Crisis

Today's increased attack surface includes VPN vulnerabilities and availability risks, phishing scams, and automated threats.

Securing the Public Cloud When Your Workforce is Remote

Remote employees are not protected by security controls that are typically available when working in the enterprise network.

Considerations When Evaluating Dual Vendor DDoS Protection

Check in with Dileep Mishra, a Radware Sales Engineer, as he covers the top two considerations when evaluating dual vendor strategies for DDoS mitigation.

4 Verticals Most Targeted by Bad Bots

Cybercriminals write & deploy very sophisticated bots to overcome security measures and take over user accounts, disrupt service availability & more.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.