Recent Articles

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.

Cloud WAF Application Analytics

Radware's Cloud WAF Application Analytics optimizes Cloud WAF security policies, increases visibility into cyber defenses, streamlines reporting & more.

What to Do When You Are Under DDoS Attack

A DDoS attack can carry significant costs and consequences. However, these key steps can help minimize the impact and get you on your way to recovery.

Saving Creatures Big and Small with Cybersecurity

IoT is being leveraged to monitor and protect species that are integral to our global ecosystems, from rhinos to dairy cows to honeybees.

How to Practice Safe Public Wi-Fi Usage

Radware recently surveyed more than 2,000 consumers to better understand how they handle their own personal data. What we learned is that people often don’t understand the implications of their own actions on the security of their information, and overwhelmingly they place convenience over security—which can have...

A Healthy Bot Management Strategy

The quality of bot detection determines the quality of the solution. And as bots become ever more sophisticated, detection becomes ever more challenging.

Why In-House Bot Management Solutions Are Unreliable

In-house bot management solutions struggle to understand distinctive user behavior, and result in false positives and negatives.

Gaming Companies Beware: Cyber Criminals Are Coming For You, Too

Cyber criminals aren't just targeting gamers, they're also targeting the gaming industry and those that support it at high volumes for profit.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.