Radware: A 4x WAF Leader According to KuppingerCole

What does it take to be a leader in application security? Cybersecurity analyst firm KuppingerCole addressed this exact question in their newly released Leadership Compass...

This was H1 2022 – Part 1 – The Fight Against Cybercrime

After many long lockdowns, the information technology industry woke up to a new reality. Cyber crime was too widespread and heavily resourced. Hybrid architectures...

Visibility into Peacetime Traffic. Is it Too Much to Expect From Your DDoS Protection Provider?

Today, everyone has at least one insurance policy. It could be a healthcare, automobile, or life insurance policy. We invest heavily in these policies...

How to Fight Bad Bots and Win: Radware’s New Crypto Mitigation Algorithms

Facing a daily barrage of attacks by bad bots, today’s web application defenses are starting to show their age. The challenge is huge. A...

The Four Pillars of a Cybersecurity Strategy That Works

Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization's defensive posture is another. Threat intelligence empowers...

Why Automation is a Must Have for Disaster Recovery

We have seen a spate of cloud service provider outages with overly negative economic impact. The AWS outage in December 2021 disrupted Disney+, Ticketmaster,...

The Security Vulnerabilities of Third-Party Collaboration Tools

How many of you still participate in-person meetings on a daily basis? If this question was asked before the beginning of 2020, it would have...

The Danger of API Security Overconfidence: Four Takeaways from Radware’s 2022 State of API Security Survey

A short list of the companies that have suffered recent API-related breaches are a who’s-who of the global technology brain trust: Microsoft,...

Q1 2022 DDoS and Application Attack Activity: An Overview

The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors...

Securing applications in the multi-cloud: Where should organizations start?

The cloud represents a gamechanger in the way businesses access and use technology, but it’s also brought with it major implementation challenges....