This post is also available in: French German Italian Japanese Portuguese (Brazil) Spanish Russian

Ben Zilberman

Ben Zilberman is a director of product-marketing, covering application security at Radware. In this role, Ben specializes in web application and API protection, as well as bot management solutions. In parallel, Ben drives some of Radware’s thought leadership and research programs. Ben has over 10 years of diverse experience in the industry, leading marketing programs for network and application security solutions, including firewalls, threat prevention, web security and DDoS protection technologies. Prior to joining Radware, Ben served as a trusted advisor at Check Point Software Technologies, where he led channel partnerships and sales operations. Ben holds a BA in Economics and a MBA from Tel Aviv University.

Five Common Pitfalls in Application Protection

As DevOps are gaining more influence on security related decisions, the information security staff has to do more than block attacks.

How To Achieve Application Protection Behind AWS/Azure CDN

Application protection behind AWS/Azure CDN can be achieved by deploying a solution that provides provisioning, redundancy, and scale.

Why DevSecOps Should Strive for Effective Enforcement Measures

Shopping for security solutions is easy –buy whichever technology addresses the threat(s). Managing it is where it gets more complicated.

Mitigating Low-and-Slow Attacks On Applications and APIs

Low-and-slow attacks, which used to be very effective against applications, are now taking advantage of overlooked APIs.

Protecting APIs & Securing Applications So Business Can Thrive

Radware partnered with Osterman Research to study recent developments in the field of application infrastructure and data security.

Gartner Ranks Radware #1 for API & High Security Use Cases in 2020 Critical Capabilities Report

Radware scored highest in two out of four Use Cases in the latest 2020 Critical Capabilities for Application & API Protection report.

4 Approaches to Securing Containerized Applications

As enterprises adopt containers running microservices, they are unsure how to secure these ecosystems. Here, we compare approaches.

Value Stream Mapping & Security in Software Development

Prospects see built-in security in applications as value. Keep that in mind when designing the ecosystem and mapping activities & responsibilities.

Cracking Passwords and Taking Over User Accounts

The right bot manager can help block illegal account access before fraudulent transactions can occur, as well as sophisticated account takeover attacks.

Malicious Bots Have Realized Your APIs Are the Weak Link

Modern applications and services rely heavily on API integration and communication. But 81% of organizations have reported attacks against their APIs.