Home Security

Security

Emotet Attacks Spread Alongside Fears of Coronavirus

Threat actors are leveraging rising fear of the coronavirus to issue malicious Emotet malware campaigns for personal gain.

Creating a Secure Climate for your Business

Today's IT landscape looks drastically different than it did a few years ago. Networks are more digitized and complex due to new, emerging technologies.

A Primer on the California Consumer Privacy Act

At its core, the CCPA is a data protection policy to ensure that the privacy rights of internet users in California are seriously enforced

Mitigating the State-Sponsored Threat

Here are four key strategies that any and every organization should consider before mitigating the state-sponsored threat.

Microservice Architectures Challenge Traditional Security Practices

Microservice architectures meet organizations’ need for speed, but the tradeoff is the introduction of new security challenges.

The Move to Multiple Public Clouds Creates Security Silos

The strategic use of multiple public cloud environments introduces new business challenges & adds complexity to how applications are secured.

How E-tailers Can Better Manage the Automated Threat Landscape

E-tailers must be diligent in their approach to find and mitigate malicious sources of bot activity.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

Bot Management Keeps Online Gamers & Businesses Happy

The online gaming industry experiences peak engagement & sales during the holiday season. Along with peak traffic comes a lot of unwelcome bot traffic.

10 Most Popular Blogs of 2019

We had a lot to write about this past year. Here, we recap our ten most popular blogs of 2019

How E-commerce Sites Can Counter ‘AuthBots’

AuthBots, a new form of malicious software, are targeting the login pages of online retailer sites.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.