Recent Articles


Cybercriminals Use Automation, Here is Why You Should Too

Automated tools have become a common component of a cybercrimin’ toolkit
Cyber threats

Q3 Quarterly Report of DDoS and Application Attacks

Radware’s Quarterly DDoS and Application Attack Report provides an overview of attack activity witnessed during the third quarter of 2021.
Cyber threat

Radware Threat Researchers Live: Ep.15

Tune in and watch our Threat Research team break down last month's threat landscape and discuss what the latest threat actors are up to.
Open banking

Designing a Secure Open Banking Environment 

In Open Banking, the customer data is securely exposed to TPPs via APIs only when the consent is provided by the customer.

8 Ways to Protect Ecommerce Sites and Customers This Holiday Season

Retailers need to be prepared to not only handle traffic surges during the sales season, but also protect their customers from cybercriminals
cloud security

Understanding Cloud Permissions and How to Control Excessive Permissions

Key challenges of managing permissions in the cloud is that it provides additional types of permissions that are not observed in premise based environments.
data breaches

How Your Organization Can Prevent Data Breaches

Detection is essential, but correlation is critical. To prevent data breaches, you need to correlate events across multiple threat surfaces
Ddos solutions

How to Choose the Right DDoS Solution

This guide examines the various deployment models for DDoS protection and reviews that combine cloud and premise-based components

Phantom Floods: Are Service Providers Blind to These DDoS Attacks?

Phantom flood attacks and other low volume attacks are a significant security threat for service providers and their customers.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...


The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.