Recent Articles

Understanding the Shared Responsibility Model

The failure of customers to fully understand and adhere to the shared responsibility model is responsible for the majority of public cloud data breaches.

3 Attack Surfaces That Can Take Your Game Offline

Gaming is a hot, profitable industry. It’s why cybercriminals go above and beyond to disrupt online gaming services and impact the multiplayer experience.

Understanding the Security Risks of Cloud Environments

The cloud enables flexibility, but its decentralized nature adds complexity to how applications and computing resources are secured.

Managing the Evolving Security Threat Landscape

As companies fast-tracked their cloud migrations, they also increased the attack surfaces from which hackers can try to gain access to their data.

Be On Alert During Election Season

From disruptive DDoS attacks to influential campaigns, several countries have already experienced election interfering cyberattacks this year.

Inadvertent Routing Error Causing Major Outage

Internet or BGP Hijacking is unfortunately a common, but mostly short-lived, incident caused by an unintended configuration error.

Radware Threat Researchers Live: DDoS-For-Hire

Daniel Smith and Pascal Geenens discuss the latest news relating to network and application threats, focusing on the DDoS-for-Hire threat landscape.

Application Security in Today’s Multi-Cloud World

Managing applications in heterogeneous cloud environments introduces new challenges for IT, DevOps and application owners.

Creating a New Cybersecurity ‘Norm’

Now is time to increase attention to security technology. Securing infrastructure is critical to ensuring service availability and business continuity.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.