main

Security

Bridging the Cyber Security Skills Gap

November 7, 2017 — by Radware0

bridging-skills-gap-960x640.jpg

The following is a Q&A with Ron Winward. Ron is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cyber security service providers around the world.

Behind every new hack or data breach, there’s a company scrambling to put out the fire. That’s good news for cyber security professionals with the right skills. However, between shortages in qualified security professionals, evolving attack vectors, and new DDoS mitigation capabilities and deployment models, organizations looking to safeguard themselves can be left in a difficult position when it comes to finding the best talent, whether it be in-house or outsourced.

Attack Types & VectorsSecurity

Evolution is the Name of the Game

November 2, 2017 — by Radware0

evolution-q-and-a-960x676.jpg

The following is a Q&A with Daniel Smith, an information security researcher for Radware’s Emergency Response Team. He focuses on security research and risk analysis for network and application based vulnerabilities. Daniel’s research focuses in on Denial-of-Service attacks and includes analysis of malware and botnets. As a white-hat hacker, his expertise in tools and techniques helps Radware develop signatures and mitigation attacks proactively for its customers.

Attack Types & VectorsSecurity

So easy, a child can do it: 15% of Americans think a grade-schooler can hack a school

September 6, 2017 — by Radware0

students-hacking-schools-960x643.jpg

Yes, you read that right. When asked how easy they thought it would be for a student in grades 1-6 to hack a school, 15 percent of respondents said it was either somewhat easy (6 percent) or very easy (9 percent). The numbers rise with age. Some 57 percent think a high school student could easily hack a school, and 63 percent think an undergraduate would have no problem. These responses were part of a survey of 1,000 Americans conducted by SurveyMonkey on behalf of Radware.

Security

A fifth of millennials would rather the U.S. government see what’s on their phone than their significant other

April 18, 2017 — by Radware23

harris-poll-govt-privacy-960x640.jpg

Breaches of personal data have big consequences. Ask any user of Ashley Madison. Ask executives at Sony. Ask Hillary Clinton’s campaign. And, as we learned from the recent Wikileaks dump, all those private messages you’re sending may not be so private.

So, if you had to choose, who would you rather have view what is on your phone? The government? Or your significant other?

Security

Radware’s Top Blogs of 2016

January 5, 2017 — by Radware0

top-5-posts-2016-960x577.jpg

Happy Near Year! Another year has come and gone in the blink of an eye. 2016 brought with it several interesting threats and attacks in the cyber-security space, among them the largest DDoS attack in history, the enslavement of Internet of Things (IoT) devices by botnets, the rise of cyber ransom and more – all of which we have dutifully reported here on the Radware Blog.

You, our readers, are what drive our dedication and commitment to industry insight. So what did you think of 2016? We’ve compiled a list of the top 5 blogs you most loved from last year.

Security

Darknet: A One-Stop Shop for Would-Be Criminals

December 29, 2016 — by Radware0

darknet-roundup-960x641.jpg

There has been much talk in 2016 about the Darknet, a dangerous place where illicit or underground activities are conducted and consisting of many digital marketplaces where items can be bought or sold for cryptocurrencies. It sounds like the stuff of crime novels, and in a way, it is – commodities like drugs, guns, and cyber-attack services can all be found if you know where to look. The below blogs from ERT Researcher Daniel Smith will provide more information on what exactly the Darknet is, how to access it, and what can be found there.

Attack Types & VectorsSecurity

The Rise of the Internet of Things (IoT)

December 28, 2016 — by Radware0

iot-roundup-960x641.jpg

Unless you have been living under the proverbial rock, you probably heard about a number of Internet of Things (IoT) attacks this fall, beginning with KrebsOnSecurity, then OVH, then the DDoS attack on Dyn DNS. All of this started with a bot called Mirai, and involved IoT devices. Why is this important? By 2020, it is estimated that the number of connected devices is expected to grow exponentially to 50 billion. A survey by HP indicates that about 70% of these devices have vulnerabilities, making them the perfect targets for botnets like Mirai.