How To Increase Logging Performance & Save $100,000 As many CISOs out there know too well, web-accessed applications must provide logging to enable anti fraud and business context… Meryl Robin | May 31, 2012
Key Trends Impacting the Next-Gen Data Center – Part 2 In the first part of my blog series, I shed light on the key trends that impact the next-generation data… Nir Ilani | May 29, 2012
Place Security Controls at Multiple Levels Well-kept secrets – The importance of blocking and masking measures for data leakage prevention Nowadays organizations are more and more… Deborah Manor | May 24, 2012
ERT Threat Alert: TheWikiBoat Group Targets the World’s Largest Organizations Radware’s Emergency Response Team (ERT) releases a new threat alert regarding an upcoming DDoS attack on Friday, May 27th. Ronen Kenig | May 23, 2012
Three Security Considerations for IPv6 Launch Day – June 6th, 2012 A quick overview – – What is IPv6 Launch Day and why should I care? In case you haven’t been… Carl Herberger | May 22, 2012
Hot Topics at the Cloud Computing Conference A couple of weeks ago I was asked to speak at the Cloud Computing Conference in Tel Aviv to present… Yaron Azerual | May 17, 2012
IBM Impact 2012: A Showcase of Innovation, Transformation and Growth I just got back from IBM Impact 2012 held in Las Vegas and would like to share my impressions of… Travis Volk | May 15, 2012
Using Spreadsheets as a DDoS weapon I saw an article the other day where somebody had used Google Docs incorrectly and he’d racked up a tremendous… David Hobbs | May 10, 2012
Why Bother to Demonstrate in the Streets When You Can Simply Launch a Cyber-Attack on a Government Website Not in favor of the new law that was just passed, immigration policies too racist, the Catholic Church too corrupt,… Ronen Kenig | May 7, 2012