Home Security

Security

The (Security) Dangers of Over Confidence

Organizations did not recognize that a scattered approach to web application security left them vulnerable to attack, and confidence remained high.

Happy Dyn Attack Anniversary!

There is a vast underground that thrives and grows on the digitization of our economy, and demonstrate no signs of slowing down any time soon.

Enhancing Application Security Processes

Organizations are performing a balancing act, pushing forward with digital transformation while seeking ways to optimize application security.

10 Commandments for Securing Microservices

Here are 10 characteristics to look for when considering protection to data and applications in a service mesh architecture.

More Destructive Botnets and Attack Vectors Are on Their Way

If the growth of the attack landscape continues at this rate, we as security practitioners need to begin asking serious questions.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

What to Do When You Are Under DDoS Attack

A DDoS attack can carry significant costs and consequences. However, these key steps can help minimize the impact and get you on your way to recovery.

How to Practice Safe Public Wi-Fi Usage

Radware recently surveyed more than 2,000 consumers to better understand how they handle their own personal data. What we learned is that...

A Healthy Bot Management Strategy

The quality of bot detection determines the quality of the solution. And as bots become ever more sophisticated, detection becomes ever more challenging.

Why In-House Bot Management Solutions Are Unreliable

In-house bot management solutions struggle to understand distinctive user behavior, and result in false positives and negatives.

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.