This post is also available in: Japanese

Ben Zilberman

50 POSTS0 COMMENTS
Ben Zilberman is a director of product-marketing, covering application security at Radware. In this role, Ben specializes in web application and API protection, as well as bot management solutions. In parallel, Ben drives some of Radware’s thought leadership and research programs. Ben has over 10 years of diverse experience in the industry, leading marketing programs for network and application security solutions, including firewalls, threat prevention, web security and DDoS protection technologies. Prior to joining Radware, Ben served as a trusted advisor at Check Point Software Technologies, where he led channel partnerships and sales operations. Ben holds a BA in Economics and a MBA from Tel Aviv University.

Ask Yourself: Do I Need an Emergency Response Plan? WHY?

Like the old words of wisdom “______ happens” (or simply, incidents occur), this is a fact of life. There are troubles you know you’re...

Expectation management – What can vendor management systems do for you?

Have you noticed all management systems promise the same value? Have you ever met a vendor who did not offer “advanced automation,” “flexible customization”...

5 Cyber Attack Developments Worth Your Attention

Are you concerned about being targeted? I am. As an IT person, it’s hard not be afraid when cyber attackers are always one step...

You’ve Been Clickjacked!

So you have the latest in DDoS and WAF protection. You’ve ensured your company is protected against SQL injections and cross-site scripting,...

Ransomware Takes Center Stage As A Major Corporate Cyber Security Risk

It’s 9:30am.  You’ve gotten your morning coffee, checked your email, and now you are surfing the web when all of a sudden...

Shades of Grey: The Good, The Bad, and The Ugly Side of Web Scraping

Webscraping, data mining, cookieing… these are just some of the many tactics used by businesses to collect information from other websites for...

Could Your Network Survive APDoS or Hit-and-Run DDoS?

Can you guess where a network breach first occurs? When a CISO asked this question during a recent business trip my answer was simple:  “Sure!...

Best Practices for Hybrid Cloud/On-Premise Attack Mitigation

The cybersecurity industry keeps us all on our toes trying to follow up with solutions and breakthrough technologies - not only in advanced security...