Home Security

Security

The Growing Threat of Payment Fraud for Online Retailers

The best way to stop payment fraud is to stop cyber criminals right at the outset ─ as soon as they visit your site.

Retailers, How Much of Your Holiday Traffic is Actually Human?

In order to better predict bot behavior for the 2019 holiday season, we analyzed the 2018 November-December bot data from our network. Here's what we found.

Why Organizations are Failing to Deal With Rising Bot Attacks

Despite serious threats, businesses aren't adopting bot management solutions; they are instead using in-house resources, putting user security at risk.

How to Recover from a DDoS Attack

Recovering from a DDoS attack is no simple matter, but once an attack is over, it is time to assess the impact, evaluate your defenses, and better prepare for the next incident.

TCP Reflection Attacks: Then and Now

Expect to see TCP amplification used in parallel with UDP amplification as part of a multi-vector campaign designed to defeat mitigation defenses.

Threat Alert: TCP Amplification Attacks

Throughout 2019, Radware’s Threat Research Center (TRC) and Emergency Response Team (ERT) have been monitoring and defending against an increasing number of TCP reflection...

Cloud-Native Application Security Challenges

With all the power that microservice architectures and service mesh infrastructures provide, they do not address application and data security challenges.

Consistent Security Meets Continuous Deployment on Azure

Today's focus on continuous integration and deployment makes it difficult for security teams to identify and mitigate risks.

The State of AI in Cybersecurity Today

Artificial intelligence is a requirement to keep ahead of cyber threats today and even more so in the future.

The (Security) Dangers of Over Confidence

Organizations did not recognize that a scattered approach to web application security left them vulnerable to attack, and confidence remained high.

Happy Dyn Attack Anniversary!

There is a vast underground that thrives and grows on the digitization of our economy, and demonstrate no signs of slowing down any time soon.

Enhancing Application Security Processes

Organizations are performing a balancing act, pushing forward with digital transformation while seeking ways to optimize application security.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.