Home Security

Security

5 Things Businesses Should Know About Storing Customer Data

Organizations should strive to do whatever they can to avoid breaches in the first place before they find out the hard way.

How to Secure a Changing Application Environment Across Platforms

There are many reasons why organizations leverage multiple platforms, but they all face the problem of securing a changing app environment.

Here’s How One Airline Upgraded Its Security in the Cloud

This is how one airline upgraded its security capabilities after experiencing a massive Brute Force attack.

Radware Threat Researchers Live: Episode 9

The latest episode of Radware Threat Researchers Live dives into booters and stressers, honeypots, ProxyLogon, the Tokyo Olympics and more.

Mitigating Low-and-Slow Attacks On Applications and APIs

Low-and-slow attacks, which used to be very effective against applications, are now taking advantage of overlooked APIs.

Addressing the Challenges of Least Privilege Access

In a cloud environment, adhering to the principle of least privilege reduces the risk of threat vectors accessing sensitive assets or data.

Security and DevOps: Keep it Tight

Here are some key characteristics to consider when evaluating WAAP that integrates well into your CI/CD pipeline.

IoT Botnets: Perspectives from a Residential Router

Residential routers face risks from the propagation of IoT botnets and the problem devices present once they are infected.

How to Keep APIs Secure in an Interconnected World

No matter how many APIs your organization chooses to share publicly, you must establish a comprehensive application/API security policy.

From Rule- to Machine Learning-Based Security

Organizations need to address the growth of more sophisticated attacks on APIs with machine learning-driven security.

How WAFs Can Mitigate The OWASP Top 10

These are the technical capabilities security professionals should consider when evaluating WAFs to protect against the OWASP Top 10.

Radware Threat Researchers Live: Episode 8

In the latest episode of Radware Threat Researchers Live, Pascal Geenens & Daniel Smith take a deep dive into today’s cyber threat landscape.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

How Can You Protect What You Can’t See?

Radware’s 2019–2020 Global Application & Network Security Report combines statistical research and front-line experience to identify cybersecurity trends.

5 Steps to Prepare for a DDoS Attack

It’s inevitable almost as death and taxes: somewhere, at some point, you will come under a DDoS attack.

C-Suite Survey: Accelerated Cloud Migrations, Lagging Security

The 2020 “C-Suite Perspectives Report on IT Security” reveals that COVID-19 was a major accelerant for organizations to quickly migrate to the cloud.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.