Recent Articles

Ransomware

Radware Threat Researchers Live: Episode 12

Dive deeper with our researchers as they analyze threat's happening in the industry.
SSL

Why Inspecting Encrypted Traffic Is A Must

The SSL inspection systems take advantage of the fact that the security is between two endpoints and not end-to-end.
Finance Industry

DDoS Attacks Against Financial Institutes Resurge in June 2021

Over the last month, there has been a wave of attacks targeting specifically financial institutes all around the globe.
Application Delivery Controller

What To Consider Before Getting Rid of Application Delivery Controllers

Application protection is becoming a must if you want to keep your organization’s data secure; adding application protection is possible.
Cloud Security

How To Find Cybersecurity for Service Providers

Service providers are shifting to the public cloud while using virtualized networking solutions like 5G to enable new services demand.

Are Decade-Old DoS Tools Still Relevant in 2021?

Decade old tools are still effective and being used by threat actors in a world of easy to build IoT botnets & cheap attack services.

Organized Crime and How it Can Digitally Affect Your Business

In a post-pandemic world riddled with digital attacks and a hyper-partisan political landscape, access to accurate and vetted intelligence is like finding a needle in a haystack. But intelligence is a critical resource in the fight to stay current with threat actors. In a world so dependent on staying connected, as a network defender, you need to understand actors’...

How To Secure Applications At-scale From Code to Cloud

Agile development and continuous deployment methods have driven high-velocity code release environments the perfect recipe for disaster.

Behavioral Analytics: How to Secure User Experience under a DDoS Attack

Imagine the following scenario. Following the Covid-19 outbreak, a local government website became the reliable central hub to communicate governmental information to its citizens. The information might vary from instructions for making an appointment to get vaccinated while under lockdown. One evening, on the...

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.