Recent Articles

Edge Computing, 5G & IoT: Risks and Opportunities for Service Providers

Edge computing environments, the deployment of 5G networks and the mass adoption of IoT devices have placed new cybersecurity demands on service providers.

5G, Security, IoT, and ROI: Some Assembly and Automation Required

It's now possible to start rolling out managed security solutions to support NB-IoT before the wave of commercial and subscriber devices reach the market.

Sharpening the Edge

Edge computing environments, the deployment of 5G networks and the mass adoption of IoT devices have placed new cybersecurity demands on service providers.

Threat Alert: TCP Amplification Attacks

Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection attacks. TCP reflection attacks, such as SYN-ACK reflection attacks, have been less popular among attackers until recently. The lack of popularity...

Cloud-Native Application Security Challenges

With all the power that microservice architectures and service mesh infrastructures provide, they do not address application and data security challenges.

Consistent Security Meets Continuous Deployment on Azure

Today's focus on continuous integration and deployment makes it difficult for security teams to identify and mitigate risks.

The State of AI in Cybersecurity Today

Artificial intelligence is a requirement to keep ahead of cyber threats today and even more so in the future.

The (Security) Dangers of Over Confidence

Organizations did not recognize that a scattered approach to web application security left them vulnerable to attack, and confidence remained high.

Happy Dyn Attack Anniversary!

There is a vast underground that thrives and grows on the digitization of our economy, and demonstrate no signs of slowing down any time soon.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.