Bringing Networking Out of the Stone Age – Insights from the Stanford Open Networking Summit

I recently returned from the Open Networking Summit (ONS), which took place at Stanford University on October 17-19th. It’s clear from the conference that...

Cyber Monday: A Hacktivist’s Dream Come True?

So far this year has been astonishing for the “Named Attacks” by Hacktivists as illustrated in the chart below. In addition to these named...

The Hacking Eco-system: Fighting Cyber Attacks to Stay Profitable

Attacks and countermeasures typically focus on techniques, vulnerabilities, systems and tools.  There is another angle of the cat-and-mouse fight between attackers and victims --...

6 Key 2012 IT Security Considerations

By all indications 2011 will be known as a historic year in information security as threats added a whole new category of motive to...

A Friend in Need is a Friend Indeed

I just came back from a tour in Europe, meeting with both customers and journalists. It was a very interesting trip, dedicated to the...

Radware CEO Talks Data Security with AMS

With so many ways for hackers to attack an organization, the only way for a company to stay safe is to go on the...

China Rockets to the Cloud – Don’t leave your ADCs on the Ground

Last week I had a business trip to China, visiting our customers and new prospects. Our business in China is growing fast and one...

Fighting Cyber Attacks in Real Time with AMS

Most organizations that utilize network defense software have adopted a passive approach when attempting to stop cyber attacks.  That’s because most of the defense...

To LSN or Not to LSN?

While everyone is talking about IPv6 in light of the IPv4 address space depletion - driven by the increasing demand for mobile and hand-held data...

ADC Consolidation: Handle with Care

Similar to server consolidation, application delivery controller (ADC) consolidation can provide significant benefits to the data center. These benefits include higher utilization of existing...