Recent Articles

Telecom Service Providers

How DDoS Attacks Are Different for Service Providers

Protecting Service provider’s large-scale network is different, most service providers implement a DDoS protection after the fact.
5G Mobile Network

How Cloud Native Technology will Impact 5G Mobile Networks

CSPs understand today that they need more from cloud. Cloud must be rebuilt to cloud-native so that they can get business agility.
DDos Attacks

An Overview of DDoS Attacks in Q2 of 2021

We saw a rise in burst attacks and were introduced to new threat actors and hacktivist groups rising from the shadows.
Government protest

Government Faces Massive DDoS Attacks Following Protests

A massive cyberattack was launched on multiple assets of the government’s networks with the intent of bringing it down.
Attack Vectors

Why Understanding Cyber Criminals Behavior and Tools is Vital

By profiling and documenting criminal TTPs network defenders can better understand criminal behavior and how specific attacks are created.
Common Pitfalls

Five Common Pitfalls in Application Protection

As DevOps are gaining more influence on security related decisions, the information security staff has to do more than block attacks.
Cloud Data Breach

Top 3 Biggest Blind Spots That Lead to Cloud Data Breaches

Hackers can have similar access to publicly hosted workloads as IT administrators using standard connection methods, protocols and public APIs.
Application Security in programming code

How To Achieve Application Protection Behind AWS/Azure CDN

Application protection behind AWS/Azure CDN can be achieved by deploying a solution that provides provisioning, redundancy, and scale.
Ransomware

Radware Threat Researchers Live: Episode 12

Dive deeper with our researchers as they analyze threat's happening in the industry.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.