Home Application Delivery

Application Delivery

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world...

Ensuring Data Privacy in Public Clouds

Most enterprises spread data and applications across multiple cloud providers, typically referred to as a multicloud approach. While it is in the best interest of public...

Now or Never: Financial Services and the Cloud

I will get straight to the point: The time is right for the financial services (FS) industry to leverage the power of the cloud....

Ensuring a Secure Cloud Journey in a World of Containers

As organizations transition to the cloud, many are adopting microservice architecture to implement business applications as a collection of loosely coupled services, in order...

Marriott: The Case for Cybersecurity Due Diligence During M&A

If ever there was a perfectly packaged case study on data breaches, it’s Marriott’s recently disclosed megabreach. Last week, the hotel chain announced that...

Embarking on a Cloud Journey: Expect More from Your Load Balancer

Many enterprises are in transition to the cloud, either building their own private cloud, managing a hybrid environment – both physical and virtualized—or deploying...

Simple to Use Link Availability Solutions

Previously, I discussed how rerouting data center host infrastructure should be part of next-generation DDoS solutions. In this blog, I will discuss how link...

Digital Transformation – Take Advantage of Application Delivery in Your Journey

The adoption of new technologies is accelerating business transformation. In its essence, the digital transformation of businesses uses technologies to drive significant improvement in...

DevSecOps Automation? The Roadmap

In my previous blog post, I addressed the need and the process of creating applications faster and building an adaptive infrastructure that suits my...

DevOps: Application Automation? The Inescapable Path

The world is changing. IoT is becoming more and applications hold a prominent place in this new world. As IT infrastructure carries a huge...

Optimizing Multi-Cloud, Cross-DC Web Apps and Sites

If you are working from your organization's office, the chances are good that you are enjoying the responsiveness of your corporate LAN, thereby guaranteeing...

Adopt TLS 1.3 – Kill Two Birds with One Stone

Transport Layer Security (TLS) version 1.3 provides significant business benefits by making applications more secure, improving performance and reducing latency for the client. Changes...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.