Recent Articles

Cloud WAF Application Analytics

Radware's Cloud WAF Application Analytics optimizes Cloud WAF security policies, increases visibility into cyber defenses, streamlines reporting & more.

What to Do When You Are Under DDoS Attack

A DDoS attack can carry significant costs and consequences. However, these key steps can help minimize the impact and get you on your way to recovery.

Saving Creatures Big and Small with Cybersecurity

IoT is being leveraged to monitor and protect species that are integral to our global ecosystems, from rhinos to dairy cows to honeybees.

How to Practice Safe Public Wi-Fi Usage

Radware recently surveyed more than 2,000 consumers to better understand how they handle their own personal data. What we learned is that people often don’t understand the implications of their own actions on the security of their information, and overwhelmingly they place convenience over security—which can have...

A Healthy Bot Management Strategy

The quality of bot detection determines the quality of the solution. And as bots become ever more sophisticated, detection becomes ever more challenging.

Why In-House Bot Management Solutions Are Unreliable

In-house bot management solutions struggle to understand distinctive user behavior, and result in false positives and negatives.

Gaming Companies Beware: Cyber Criminals Are Coming For You, Too

Cyber criminals aren't just targeting gamers, they're also targeting the gaming industry and those that support it at high volumes for profit.

Application Delivery Challenges for DevOps

Application development now requires NetOps and SecOps to work together, thereby putting increased stress on developers and engineers.

Visibility: Do You Know What’s In Your Network?

Although you may be protected by the most advanced firewall technology, your existing security mechanisms may fail to see into encrypted SSL/TLS traffic.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.