Recent Articles

Behavioral Analytics: How to Secure User Experience under a DDoS Attack

Imagine the following scenario. Following the Covid-19 outbreak, a local government website became the reliable central hub to communicate governmental information to its citizens. The information might vary from instructions for making an appointment to get vaccinated while under lockdown. One evening, on the...

Radware Threat Researchers Live: Episode 10

The best ways to access the dark web and what to avoid on the dark web.

An Overview of DDoS Attacks in Q1

Ransom DDoS and the reliance on remote operations/teleworking fueled attacks on finance, biotech and pharmaceutical industries.

How Service Providers Can Shop For DDoS Protection

Mid-market service providers must select the optimal security solution that fit their needs, threat level and budget.

Five Challenges Mid-Market Service Providers Must Solve Today

Service provider networks are a prime target for the rise in DDoS attacks. The volume and scale of these attacks can have devastating impacts

Why DevSecOps Should Strive for Effective Enforcement Measures

Shopping for security solutions is easy –buy whichever technology addresses the threat(s). Managing it is where it gets more complicated.

How To Work With Shadow IT and Keep DevOps Happy

Shadow IT is here to stay due to benefits it brings to the organization in productivity, innovation and deployment time.

A Look at Digital Attacks on Gaming Resources During the Pandemic

The gaming industry has seen a stark increase in the volume of attacks targeting gaming companies, players and content streamers.

The Most Important Question to Ask Security Vendors Before Hiring Them

False positives remain a significant concern that affects your chances of closing a deal or making a sale.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.