Home Security

Security

A Radware Minute – New Video Series

What is a WAAP? What is API Protection? What is Cross-Site Scripting? What is Web Scraping? The world of cyber security and application protection in...

Radware: A 4x WAF Leader According to KuppingerCole

What does it take to be a leader in application security? Cybersecurity analyst firm KuppingerCole addressed this exact question in their newly released Leadership Compass...

This was H1 2022 – Part 1 – The Fight Against Cybercrime

After many long lockdowns, the information technology industry woke up to a new reality. Cyber crime was too widespread and heavily resourced. Hybrid architectures...

Visibility into Peacetime Traffic. Is it Too Much to Expect From Your DDoS Protection Provider?

Today, everyone has at least one insurance policy. It could be a healthcare, automobile, or life insurance policy. We invest heavily in these policies...

How to Fight Bad Bots and Win: Radware’s New Crypto Mitigation Algorithms

Facing a daily barrage of attacks by bad bots, today’s web application defenses are starting to show their age. The challenge is huge. A...

The Four Pillars of a Cybersecurity Strategy That Works

Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization's defensive posture is another. Threat intelligence empowers...

Why Automation is a Must Have for Disaster Recovery

We have seen a spate of cloud service provider outages with overly negative economic impact. The AWS outage in December 2021 disrupted Disney+, Ticketmaster,...

The Security Vulnerabilities of Third-Party Collaboration Tools

How many of you still participate in-person meetings on a daily basis? If this question was asked before the beginning of 2020, it would have...

The Danger of API Security Overconfidence: Four Takeaways from Radware’s 2022 State of API Security Survey

A short list of the companies that have suffered recent API-related breaches are a who’s-who of the global technology brain trust: Microsoft,...

Q1 2022 DDoS and Application Attack Activity: An Overview

The cybersecurity threat landscape in the first quarter of 2022 represented a mix bag of old enemies and new foes. New actors...

Securing applications in the multi-cloud: Where should organizations start?

The cloud represents a gamechanger in the way businesses access and use technology, but it’s also brought with it major implementation challenges....

Radware Mitigates 1.1Tbps DDoS Attack

As more businesses migrate critical resources and applications to the public cloud, attackers are adapting their tactics and techniques to match the scale of...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.