Recent Articles

Radware Minute – New Video Series

A Radware Minute – New Video Series

What is a WAAP? What is API Protection? What is Cross-Site Scripting? What is Web Scraping? The world of cyber security and application protection in particular is constantly evolving and getting more complex. We believe that understanding the landscape of application security is not the solemn business of security officers...
2022 Kuppinger Cole WAF Report

Radware: A 4x WAF Leader According to KuppingerCole

What does it take to be a leader in application security? Cybersecurity analyst firm KuppingerCole addressed this exact question in their newly released Leadership Compass for Web Application Firewalls (WAF) 2022. Their answer: it takes more than being a one-trick pony. In their detailed report, KuppingerCole demonstrates to be a market leader...
The Fight Against Cybercrime

This was H1 2022 – Part 1 – The Fight Against Cybercrime

After many long lockdowns, the information technology industry woke up to a new reality. Cyber crime was too widespread and heavily resourced. Hybrid architectures had grown too complex to be able to provide adequate defense, resulting in new larger threat surfaces. To make matters worse, there was a lack...
Visibility into Peacetime Traffic

Visibility into Peacetime Traffic. Is it Too Much to Expect From Your DDoS Protection...

Today, everyone has at least one insurance policy. It could be a healthcare, automobile, or life insurance policy. We invest heavily in these policies and have high expectations for a return on our investment when the unforeseen happens and we need the protections they provide. But most of us...
How to Fight Bad Bots and Win

How to Fight Bad Bots and Win: Radware’s New Crypto Mitigation Algorithms

Facing a daily barrage of attacks by bad bots, today’s web application defenses are starting to show their age. The challenge is huge. A user session could be a customer looking to buy a product, or a good bot such as a search engine or application monitoring tool. But...
Hacker’s Almanac Series III

The Four Pillars of a Cybersecurity Strategy That Works

Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization's defensive posture is another. Threat intelligence empowers organizations by providing them with the knowledge and visibility needed to make well-informed decisions about their security defenses and respond faster to current and evolving...
Automation is a Must Have

Why Automation is a Must Have for Disaster Recovery

We have seen a spate of cloud service provider outages with overly negative economic impact. The AWS outage in December 2021 disrupted Disney+, Ticketmaster, Slack and Netflix, among a host of others. The Facebook (now Meta) outage in October 2021 was particularly painful. It not only took down WhatsApp...
The Security Vulnerabilities of Third-Party Collaboration Tools

The Security Vulnerabilities of Third-Party Collaboration Tools

How many of you still participate in-person meetings on a daily basis? If this question was asked before the beginning of 2020, it would have raised several eyebrows. Our working days prior to the pandemic were often filled with face-to-face meetings. In post-pandemic days, even with people going back into...

The Danger of API Security Overconfidence: Four Takeaways from Radware’s 2022 State of API...

A short list of the companies that have suffered recent API-related breaches are a who’s-who of the global technology brain trust: Microsoft, Venmo, Equifax, Instagram, Facebook, Amazon, PayPal, and many others. If even these tech-savvy organizations are subject to cyberattack, the reality couldn’t...

Most Popular

What Drives DDoS Attacks and Why it Should be a Concern

DDoS stands for Distributed Denial of Service; the objective of a DoS attack is to disrupt or deny services from legitimate users.

4 Assumptions Preventing Effective API Protection

API Protection
API traffic has tripled in growth compared to the overall API traffic. Here are 4 common misconceptions companies have about API protection.

What it Means to Redefine Success in Cybersecurity

Cyber threats are not going to decrease for the foreseeable future, and the challenges they pose to organizations are very real.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...


2021 Cyberthreat Retrospective and Why It Was a Bumpy Ride

Threat landscape
2021 was the year where Ransom DoS confirmed its pervasive presence in the DDoS threat landscape.