Home Security


The Dark Side of Microservices: Are Your Applications Secure?

Microservices, which break down applications into smaller, independent services, offer numerous benefits, and using Kubernetes as the go-to for orchestration has only made them more popular.

360° Application Protection — The Shift to Best-of-Suite Solutions

For many, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack surface. Their concern is valid. No question, the cloud has expanded it.

Radware Adds a New Weapon to its DDoS-Fighting Arsenal

In 2022, Radware saw DDoS attacks grow by over 200% and the number of blocked events per customer nearly doubled each quarter. The precipitous growth in DDoS attacks is frightening.

Dependency Confusion Attacks

In recent years, there has been a significant increase in the number of software supply chain attacks. These attacks target the various...

What is Card Testing?

Card testing, also known as card checking, is a form of fraud where criminals try to determine if stolen credit card information...

A Conversation with Mark Houpt, CISO of Radware Partner DataBank

One of the many benefits that comes from working at Radware is the opportunity to work with cybersecurity professionals whose empirical experience protecting organizations from cyber threats and attacks presents a treasure trove of insightful and highly useful information. Mark A. Houpt, the CISO of data center provider and longtime Radware partner DataBank Holdings, Ltd. (DataBank), is a perfect example.

Software Supply Chain Risks for Low- and No-Code Application Development

Supply chain attacks occur when a third-party vendor or partner with less robust security measures is breached, allowing attackers to indirectly gain...

Bots Are Now Robocalling to Phish For Your Two-Factor Authentication (2FA) Codes

Phishing for 2FA codes is the latest in specialized bots that make it easier and quicker for fraudsters to fool their targets into providing their authentication codes or OTPs.

Exploring Killnet’s Social Circles

It is not common for analysts to have the opportunity to study the social circles of criminal organizations, but occasionally a group...

3 Things to Consider When Selecting a Bot Manager

A bot manager needs to do more than simply eradicate bots that come into contact with networks and employees. A level of discernment is required; remember, not all bots are bad. But it’s imperative to stop the bad, malicious bots in their tracks. Consider the following when selecting a bot manager.

Predictor or Pitfall? Third Party Security Evaluators

The use of 3rd parties to test the cyber hygiene of business partners and vendors has become increasingly common.

“What I Wish I Would Have Known About Cloud Security Prior to our Cloud Migration”

We like to query Radware customers on an array of cybersecurity subjects because we always receive insightful, interesting and, perhaps most importantly, educational responses. You’ll see that this month is no different.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.