Home Security

Security

Keep It Simple: Choosing the Right DDoS Mitigation Strategy

The cyber industry offers a plenitude of DDoS mitigation solutions. Here are a few guidelines that can help simplify your selection process.

Top Cybersecurity Challenges Facing Government Agencies

The public sector is targeted by an array of threat actors, like hackers, hacktivists & state-sponsored threats. Here's how agencies can protect themselves.

What is the Future of Cybersecurity Jobs Post-COVID19?

The current situation presents interesting opportunities for job seekers and employers looking to reinvent their organizations.

How Should APAC Organizations Protect Critical Data & Assets?

The on-going effects of the pandemic are impacting businesses' cybersecurity. Here are the latest cyberthreats CIOs need to be aware of in the APAC region.

Cybersecurity: Pay Now or Pay (More) Later

Organizations must reevaluate how they balance the investment versus risk equation and alter how and when they implement cybersecurity.

Digital Attacks on Educational Resources

With closures in response to COVID & the looming threat of additional waves, schools have digitally transformed in ways we never could've imagined.

Six Steps for Securing Smart Cities

Smart city technologies can help improve urban areas if they can stay secure & retain the trust of citizens. Here are 6 ways they can do that.

4 Questions to Ask About Open Banking Compliance

Bot attacks on websites & applications are a well-known threat. But crucial APIs, including those used for Open Banking, are increasingly being targeted.

SSL: Protective Technology Turned Attack Vector

SSL is increasingly being used to mask and further complicate attack traffic detection in both network and application level threats.

How to Get an IT Security Job: 3 Hot Skill Sets

What skill sets do you need to be successful in cybersecurity today? Here are three big ones.

Safeguarding Sensitive Law Enforcement Data: A Case Study

A national law enforcement agency needed to construct a new data center that required a complex network infrastructure design based on security needs.

How to Keep APIs Secure From Bot Attacks

Despite rapid and widespread deployment, APIs remain poorly protected and automated threats are mounting, putting business-critical services at risk.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

Getting Ready for 5G & IoT

Network performance improvements and IoT capabilities promise to help businesses move even faster. Yet uncertainty about this new technology is prevalent.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.