Recent Articles

Securing applications in the multi-cloud: Where should organizations start?

The cloud represents a gamechanger in the way businesses access and use technology, but it’s also brought with it major implementation challenges. The most fundamental of these is simply that the cloud comprises multiple services and platforms, which has made integration a critical piece in the cloud...

Radware Mitigates 1.1Tbps DDoS Attack

As more businesses migrate critical resources and applications to the public cloud, attackers are adapting their tactics and techniques to match the scale of public cloud providers. Last week, this trend played out as reality for one of the world’s largest service providers when it was hit by a...

If You Can Answer These Questions, You Have Good Application Visibility

Managing applications as well as the network and compute infrastructure around them used to be easy. Everything sat in a private datacenter and there weren’t that many applications to begin with. But with the adoption of the hybrid cloud, applications now run in multiple private and public...

How a European Electronics Retailer Ended the Bot Menace on its Portal

It’s May 2020 and a large European electronic goods retailer realizes its bot problem is going from bad to worse. In a single week, its online store is hit with eight million bot visits to systematically scrape pricing and product information without authorization —...
Multi-Cloud

A New Security Approach for the New Age of Multi-Cloud 

Most organizations today deploy web applications across multi-cloud and hybrid environments. However, existing models for application security are obsolete and no longer up to the task of providing high-grade, consistent, and frictionless application security across clouds
Cyber Attack

Threat Researchers Live: Ep 19

Pascal Geenens and Daniel Smith discuss recent and notable security events like the Russian/Ukrainian cyber conflict.
DDoS Attack

Is DDoS a Crime?

The security industry fails to regulate blatant criminal activity, and the nation seems to be rewarding bad behavior with attention.
5G service Provider

DDoS Protection in the Age of 5G Networks, Edge Computing and Explosive Bandwidth Growth

Service providers need a DDoS security solution to support new infrastructure innovations while overcoming the explosive growth in DDoS attack intensity and sophistication of phantom flood attacks.
5g Service provider

With Great 5G Power Comes Great Responsibility  

With this new infrastructure in place, services that previously could not be adopted on a large scale will now begin to emerge.

Most Popular

What Drives DDoS Attacks and Why it Should be a Concern

ddos
DDoS stands for Distributed Denial of Service; the objective of a DoS attack is to disrupt or deny services from legitimate users.

4 Assumptions Preventing Effective API Protection

API Protection
API traffic has tripled in growth compared to the overall API traffic. Here are 4 common misconceptions companies have about API protection.

What it Means to Redefine Success in Cybersecurity

cybersecurity
Cyber threats are not going to decrease for the foreseeable future, and the challenges they pose to organizations are very real.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Recommended

2021 Cyberthreat Retrospective and Why It Was a Bumpy Ride

Threat landscape
2021 was the year where Ransom DoS confirmed its pervasive presence in the DDoS threat landscape.